Google fixes a 20-year-old bug in Chrome that caused «to escape» browsing history
Almost every platform or service has its own security vulnerabilities — and Chrome is no exception. Recently, Google has already fixed several serious issues that could have given attackers access to sensitive data in the browser, and now it’s fixing another important bug.
UPDATED: Telegram users are attacked by EvilVideo — how to avoid the exploit
Telegram is positioned as a secure and private platform for digital conversation, offering features such as secret chats, end-to-end encryption (not for group chats), two-step verification, self-destructing messages, proxy support, and the ability to hide your phone number. However, these same features have made the messenger attractive to…
Odesa resident pretended to be an IT and crypto specialist — defrauded 14 acquaintances of UAH 760 thousand
A resident of Odesa district introduced himself as head of an IT company, a cryptocurrency specialist and other experienced professionals, and demanded money for services that he was not going to perform.
Fraudsters used a real phone and Google subdomains in an attempt to steal data
Programmer and founder of the Hack Club community Zach Latta reported an attempt to hijack an account from using real data Google.
More than 18 thousand unskilled hackers hit by XWorm RAT — infected malware constructor
An unknown attacker targeted inexperienced hackers, known as script kiddies. With XWorm RAT, they received a backdoor capable of stealing data and controlling the infected computer.
The world’s first ransomware appeared 35 years ago — it was distributed on 5.25″ floppy disks
In January 1990, an investigation began into a new cybercrime. The ransomware program was contained on floppy disks signed «AIDS Information — Introductory Diskette 2.0».
Artificial intelligence model can be stolen without any hacking, — scientists
It takes a ton of cash, effort, and time to train an artificial intelligence model. And relatively little effort to steal it. No need for data theft or leaks.
Fraudsters conduct a phishing attack using the brand «Nova Poshta»
«Nova Poshta» has reported that cybercriminals have conducted a phishing attack using the company’s brand. Fraudsters are sending fake messages to Ukrainians about alleged debts to «Nova Poshta». The company claims that these letters have nothing to do with it.
State registers suffered from Russian hacker attack – recovery will take about 2 weeks
On December 19, Ukraine’s state registries were subjected to a large-scale cyberattack, which is being linked to Russian actions. As a result of the attack, the Unified and State Registries managed by the Ministry of Justice were temporarily suspended. About said Vice Prime Minister for European and Euro-Atlantic Integration Olha…
Android got a function to search for unknown Bluetooth trackers
With the advent of Bluetooth trackers, it has become much easier to find lost items such as bags or keys. However, this technology can also be used for unscrupulous surveillance. To solve this problem, Google is introducing a new feature to its Android devices.
Miscalculated, but where? A hacker hacked into companies without hiding his data and offered to hire him
In the USA, a man frequented businesses, including a gym where he worked out, hacked computers, and then offered to be hired. The outcome was somewhat predictable.
Ajax presents DoorBell video doorbell with AI, IndoorCam surveillance camera and other security devices
Ajax Systems held the sixth annual presentation of the latest security technologies at the Ajax Special Event. In addition to devices, the company presented software products and services.
SK hynix employee printed 4000 pages of classified data to sell to Huawei
A former SK hynix employee was sentenced to 18 months in prison and fined $14,300 for stealing important technology before she joined Huawei.
Robot uprising: hacked Ecovacs vacuum cleaners swear, chase animals and spy on owners
Owners of Ecovacs robotic vacuum cleaners in US cities have reported a hack. The hackers gained access to the cameras and controls, cursed obscenely through the speaker, and chased animals.
A hacker has found a way to hack any KIA and get the owner’s data — again
Through two years after the Kia ChallengeAfter the hackers found a way to steal almost any KIA and Hyundai produced after 2011, the Koreans are back in the spotlight. A newly discovered vulnerability allows any Kia with a license plate alone to be unlocked and started.
Telegram will transmit the IP address and phone number of criminals at the request of law enforcement
Telegram owner Pavel Durov said about some updates to the platform that will make it more difficult to use it for illegal purposes.
Robocop’s time has come: police robot detains suspect after shooting
A robocop detains a bandit. An armed suspect barricaded himself in a motel and shot at a police robot. Despite this, the robot was able to overpower and detain the man.
First photo of the wreckage of the OceanGate «Titan» and the circumstances of the disaster — public inquiry begins in the United States
During an open hearing of the U.S. Coast Guard, new horrific details of the «Titan» submarine disaster that occurred last June became known.
RAMBO steals secrets: RAM radiation can transmit data to attackers
Governments and other institutions often use systems without network access. But the RAMBO method allows you to send data from RAM to the outside.
Hackers attacked smartphones of Ukrainian Armed Forces soldiers through Signal – trying to determine GPS coordinates of devices
Ukrainian experts from CERT-UA and MILCERT have detected and analyzed two cyberattacks on Ukrainian military mobile devices. The hackers tried not only to steal information from the devices but also to gain access to the GPS coordinates of the Ukrainian Armed Forces.
Google Pixel smartphones have been sold with a serious vulnerability since September 2017
Cybersecurity company iVerify has released a new report on a vulnerability in Google Pixel smartphones. It is noted that most of these phones sold since September 2017 included software that can be used to monitor or remotely control users’ devices.
Epic Games CEO says Apple’s Find My — feature is «creepy surveillance technology» that shouldn’t exist
Epic Games CEO Tim Sweeney has criticized Apple’s Find My («Locator») service because of the ability to track other people. This is how he reacted in service X to the news about Find My from 9to5mac. Although the original news was not about security issues at all, but about the fact that the service works in all countries of the world…
Take care of your electric car: Hackers can hack fast charging stations and change car firmware using 1920s technology
Engineers at Southwest Research Institute (SwRI) have discovered a vulnerability in DC fast-charging stations that allows hackers to access an electric vehicle and modify its firmware.
Google Gemini artificial intelligence snooped through a user’s file without permission
Artificial intelligence in the form of assistant programs on computers and smartphones raises natural security concerns. Google Gemini seems to be reading user files even if it is prohibited.
Elon Musk wants to create «Iron Man» armor after Trump’s assassination attempt
The failed assassination attempt on former US President Donald Trump has many people thinking about security. Elon Musk, who is often compared to «Iron Man» Tony Stark, decided to create his own armor.
A sysadmin installed a virus on a client’s computer while repairing it. It took a year and three trials to punish him
One of the users of the OLX service posted an ad offering his services. The man was engaged in repairing and customizing computers. One of his customers approached him for such services. In addition to the usual PC setup, he also wanted to install a program to record computer activity.
Not only for the Internet: a new Wi-Fi system will help catch a burglar who has broken into a house
The Dutch startup Gamgee has launched a crowdfunding campaign for a home security system that detects physical intrusions by intruders using existing Wi-Fi. The company claims that the system Gamgee Wi-Fi Home Alarm with the help of artificial intelligence, «body prints» trusted people and pets, and a home mapping program, provides thorough…
Largest database of stolen passwords in history with 10 billion records appears on a hacker forum
The largest database of stolen passwords with almost 10 billion unique records has been leaked on a popular hacker forum. The Cybernews research group believes that the leak poses a serious danger to users who tend to reuse passwords.
OpenAI «hacked» by a hacker, the company did not report it — insiders
It became known that in early 2023, a hacker gained access to OpenAI’s internal messaging systems and stole information about artificial intelligence technologies The New York Times claims that OpenAI reported the incident to employees, but not to the public or law enforcement.
The Ministry of Digital Transformation once again refutes information about the alleged hack of «Diyi» and provides new arguments
After yesterday’s publication of the material about the U.S. government’s search for a Russian hacker who allegedly hacked «Diia» in 2022 and posted data on 13.5 million of its users on the darknet, ITC.UA received a comment on behalf of the Ministry of Digital Transformation. The sender of the email used the domain thedigital.gov.ua,…
Your data could be in there: The US is looking for a hacker who may have hacked «Action» in 2022
The US federal authorities are offering a $10 million reward for help in finding a Russian hacker accused of supporting the invasion of Ukraine in 2022. He carried out attacks on Ukraine’s state computer systems, posing as an ordinary cybercriminal, but in fact cooperating with Russian military intelligence.
Attack «evil twin»: attacker simulates airplane Wi-Fi and steals passenger data
The Australian Federal Police (AFP) has accused a suspect of launching a fake Wi-Fi network on an airplane and using it to harvest passenger email and social media credentials – the so-called «evil twin attack». Suspicion fell on the man after the airline reported a suspicious Wi-Fi network that its employees discovered during the flight.
Significantly more than «30 engineers»: security experts commented on Telegram’s concerns
After the publication of the material «Durov boasts that Telegram employs «about 30 engineers» ─ security experts call this a «red flag» for users» A representative of Telegram contacted ITC.UA and commented on the main points of concern for security experts.
Updated: Durov boasts that Telegram employs «about 30 engineers» ─ security experts call this a «red flag» for users
Last weekend, X (formerly Twitter) posted a video of a recent interview with Telegram founder Pavel Durov. In the video, Durov tells Tucker Carlson that he is the only product manager in the company and that he only employs «about 30 engineers».
Federal Google Pixel owners must update their smartphones within 10 days or stop using them – US government demand
The update for Google Pixel smartphones released earlier this month received a large number of security fixes. Among them was the zero-day vulnerability CVE-2024-32896. Google labeled it as «high risk» and warned users that this vulnerability could be exploited by attackers to attack the device.
Ratel RAT ransomware attacks old Android smartphones, encrypting data and demanding ransom
Cybercriminals have started attacking older Android devices using open source malware called Ratel RAT. In fact, it is a type of Android ransomware that encrypts or deletes data, locks the device, and demands payment on Telegram.
In the new Toyota GR Corolla Circuit, the owner found a GPS tracker — he had previously refused to install it
Anthony Do says he paid in full for his new Toyota GR Corolla Circuit. When he left the car in the parking lot for about a month, he returned to find that the battery was completely dead. This was due to a little «surprise» that his dealer forgot to mention — a hidden GPS tracker.
Firefighters rescued a child from a Tesla — the battery was dead and the doors would not open
Firefighters in Scottsdale, Arizona, USA, rescued a toddler from a locked Tesla after the car’s battery died. Renee Sanchez said Arizona’s On Your Sidewho was planning to take her 20-month-old granddaughter to the Phoenix Zoo when the incident occurred. The electric car’s battery ran out after she closed the door behind her…
Confidential AMD data is being sold on a hacker forum – the company has launched an investigation into a possible hack
AMD is investigating whether it has become a victim of a cyberattack. The investigation began after an attacker posted allegedly stolen data from AMD for sale on a hacker forum. He claims that the lot contains information about AMD employees, financial documents, and confidential information.
Tesla suddenly swerved into the oncoming lane while the driver was praising autonomous driving in a video
A video was posted on Reddit (now deleted) with an overly confident driver trying to demonstrate the Full Self-Driving (FSD) capabilities of his Tesla car. But a few seconds after expressing his admiration for the car’s capabilities, he has to intervene when the car turns directly into the oncoming lane.
iOS 18 and macOS 15 now have the Rotate Wi-Fi Address feature to limit device tracking
In new operating systems iOS 18, iPadOS 18 and macOS 15 Sequoia the company has replaced the Private Wi-Fi Address option with a new feature called Rotate Wi-Fi Address. It is designed to minimize the possibility of tracking.
Security researchers falsely reported a vulnerability in Office 2007 and then spent days overtime looking for a new one to avoid losing their jobs
Greg Linares shared a funny story on X about how he and his teammates announced a major zero-day vulnerability in Office 2007. However, it turned out that it was a mistake on their part. To save their reputations, their jobs, and possibly even their business, they had to scramble to find the real bug. It happened in late 2006, when Linares was…
AirTag harassment — US charges Russian gang member with intimidating ex-wife
The United States accuses a suspected member of a Russian smuggling network of using AirTags to stalk his ex-wife, reports 404 Media based on the recently disclosed accusation. A citizen of Tajikistan, Ibodullo Numanovich Mukhiddinov, is suspected of smuggling his now ex-wife (referred to in the case as S.K.) to the United States through the…
Senior US Navy commander illegally installed Wi-Fi on a ship — she was fired and demoted
The U.S. Navy has shut down an illegal Wi-Fi network on a warship. The senior commander who ordered the installation was demoted. The now former senior commander, Grizel Marrero, was convicted in March, according to the Navy Times, which received documents on the trial.
Revenge for stealing an iPhone and setting fire to the wrong house — man pleads guilty to killing five people
On Friday, May 17, 20-year-old Kevin Bouie pleaded guilty to the murder of a family of five over a stolen Apple iPhone. The fact that the young man confused the houses and set fire to the wrong door adds to the horror, although the crime is already serious.
Hackers attacked servers of the UK Ministry of Defense
The UK Ministry of Defense has fallen victim to a hacker attack. This resulted in a massive leak of military personnel data. The government does not name the country involved in the attack, but Sky News reports that it is China.
Ukrainian hacker from the REvil ransomware team is sentenced to 13 years in prison and a $16 million fine
On October 8, 2021, Ukrainian Yaroslav Vasinsky was arrested on the border of Poland and Ukraine, accused of hacking into business software provider Kaseya in Florida. In March 2022, Vasynsky was extradited to Dallas, Texas.
Are you sure you’re not a robot? The new era of CAPTCHAs is here — and here’s why you’ve been «failing» these tests lately
«Is it me or are the tests «I’m not a robot» getting harder?», — joked British comedian Jack Whitehall in a recent Netflix appearance, complaining about his inability to correctly identify traffic lights.
Spelling error report
The following text will be sent to our editors: