Instagram will blur nudes that are sent in Direct to teenagers

Instagram will begin testing a feature that blurs out posts that contain images of the naked body. The main purpose of this innovation is to protect teenagers…

Microsoft is ending support for 1024-bit RSA keys in Windows

Microsoft has announced that RSA keys shorter than 2048 bits will soon be deprecated in Windows Transport Layer Security (TLS) to provide increased security. Rivest-Shamir-Adleman (RSA) is…

Russian hackers stole the source code from Microsoft

Earlier this year, Microsoft revealed that Russian state hackers had been spying on the email accounts of some members of its senior management team. The company now…

GitHub has enabled push protection by default to prevent leaks

GitHub has enabled push protection for all public repositories by default. This is to prevent accidental disclosure of sensitive information such as access tokens and API keys…

The US White House urged developers to avoid C and C++, to use “memory-safe” programming languages

The US government recommends abandoning C or C++ programming tools. In a new report, the White House Office of the National Cyber ​​Director (ONCD) urged developers to…

Telegram includes a number of threats to the security of Ukraine

Ukrainian intelligence believes that Telegram contains a number of threats to the security of Ukraine, and it is necessary to look for solutions to this problem. Andriy…

3 million smart toothbrushes were used in a DDoS attack that caused millions of euros in damage

The Swiss newspaper Aargauer Zeitung reports that hackers hacked about 3 million smart toothbrushes in order to use them to carry out a DDoS attack. At the…

“Ukrposhta” and “Naftogaz” suffered due to cyberattacks – they had interruptions in their work

The Technology section is powered by Favbet Tech The Russian-Ukrainian war is increasingly moving into cyberspace. At the end of last year, Kyivstar became the target of…

iOS 17.3 adds “Stolen Device Protection” ─ additional verification of Face ID or Touch ID for a number of actions

Apple has released an update for its mobile operating system. iOS 17.3 brings several improvements, most notably a new security feature called Stolen Device Protection. It will…

Hackers sent malicious software to the Armed Forces under the guise of recruiting in 3 Armed Forces and the IDF – CERT-UA

Specialists of the government emergency response team of Ukraine CERT-UA, with the help of Trendmicro, investigated a series of cyber attacks aimed at servicemen of the Armed…

Russian hackers penetrated the network of “Kyivstar” several months before the attack and were able to destroy “practically all” ─ SBU

December 12, 2023 was a black day for Kyivstar. Then Russian hackers launched an attack that practically paralyzed the operator’s work. As it turned out, hackers penetrated…

The cyber police invites you to the information security project MRIYA – for training in cyber hygiene and countering Russian disinformation

The Cyber ​​Police continues to develop the MRIYA project, created together with volunteers. It started as a chatbot to report hostile bots, then turned into a social…

hackers send RemcosRAT malware emails

Criminals continue to use the problems of mass concern of Ukrainians to spread malicious software. Specialists of CERT-UA recorded a mass distribution of e-mails speculating on the…

monobank summarized the results of the first Bug Bounty for UAH 1 million — “white” hackers found a number of P2-P4 vulnerabilities and earned $6,800

monobank passed the first external pentest – according to the results of the first Bug Bounty, which took place on December 1, accredited “white” (ethical) hackers found…

monobank summarized the results of the first Bug Bounty for UAH 1 million — “white” hackers found a number of P2-P4 vulnerabilities and earned $6,800

monobank passed the first external pentest – according to the results of the first Bug Bounty, which took place on December 1, accredited “white” (ethical) hackers found…

The SBU is helping to restore the Kyivstar network – today they plan to restore the home Internet

The Security Service of Ukraine involved its cyber experts in the team to restore the Kyivstar operator’s network after yesterday’s hacker attack. They will cooperate with “Kyivstar”…

Apple and Google are believed to be spying on push notifications on users’ smartphones and handing over the data to governments

Foreign governments may be spying on smartphone use, and now Sen. Ron Wyden’s office is pushing Apple and Google to reveal exactly how it’s happening. Push notifications…

“Nova Poshta” denied information about promotions and raffles in exchange for registration

Recently, in some Telegram and Viber channels, as well as in social networks, various announcements about promotions and raffles, allegedly held by well-known companies, began to spread….

Games with a flamethrower and hundreds of cripples, or the culture of (in)security of Elon Musk’s SpaceX, which is flying headlong to Mars

Reuters conducted an investigation into the state of security at SpaceX and found numerous violations. They lead to serious injuries and even fatalities among employees. We help…

Cyber ​​police exposed an attacker who sold personal data of 300 million Ukrainians and EU citizens for $500-2,000

The cyber police reported on the exposure of a 36-year-old resident of Netishyn, who sold personal data of citizens of Ukraine and the European Union through controlled…

iOS 16.4.1, iPadOS 16.4.1 and macOS 13.3.1 updates have been released with fixes for two vulnerabilities that were already used by attackers

Apple has released iOS 16.4.1, iPadOS 16.4.1, and macOS 13.3.1 operating system updates for iPhone, iPad, and Mac, respectively. It is recommended that you install them as…

Data-stealing malware created by ChatGPT has been tested by VirusTotal

Since its launch last year, ChatGPT has impressed with the ability to write articles, poems, movie scripts, books and more. The AI-based tool can even generate functional…

Tor Developers Announce Mullvad Secure Browser – A FireFox Clone With Its Own Privacy-Focused VPN

The creators of the anonymous network and secure browser Tor have released the privacy-oriented Mullvad browser, which works through the VPN of the same name. The browser…

Built-in VPN in Microsoft Edge – the service has already appeared in the stable build of some users and offers 1 GB of free traffic per month

Almost a year ago, Microsoft started testing its VPN for the Edge browser. The Edge Secure Network service provides 1GB of free traffic to increase privacy or…