Why sharing personal data in mobile apps can be dangerous?
- April 12, 2022
Businesses today can rent cloud servers. But to keep the information there securely, you need to be able to manage it. What will happen if you do not pay enough attention to
Businesses today can rent cloud servers. But to keep the information there securely, you need to be able to manage it. What will happen if you do not pay enough attention to
Hackers have invented a new way to cheat Android users. They make them think that the smartphone is turned off, but in fact, the device is hacked by criminals and steals their
In early March, Nokia said it was suspending supplies to Russia. Now the company has announced that it has completely exited the Russian market. Nokia noted that from the first days of
George Held, Veon’s director of digital products, predicted that humanity will abandon smartphones within a decade. According to him, this device will be a first and will be replaced by more advanced
The Qbot botnet now distributes malware via phishing emails with password-protected ZIP archive attachments containing malicious Windows MSI installer packages. This is the first time Qbot has used this tactic to abandon
TyHto application has been launched to instantly check suspects in Ukraine. The service was developed by the YouControl and Artellence teams with the support of SBU cyber experts. Its main purpose is
In March, the price of the Microsoft Surface Duo 2 smartphone was reduced from $ 1,500 to $ 1,250, and now the same Best Buy store offers to buy a phone with
Apple has confirmed on June 6 that the company will begin its annual developer conference WWDC 2022, where it will present several new technologies and features planned for its devices. The company
Xiaomi has previously launched a flagship smartphone lineup that includes Xiaomi 12, Xiaomi 12 Pro and Xiaomi 12X. Xiaomi 12 Ultra and Xiaomi 12 Lite are also preparing to launch. The specs
The Android banking Trojan, which the researchers named Fakecalls, has a powerful feature that allows them to call the bank’s customer support number and directly connect the victim to cybercriminals using malware.