Cybersecurity

The best RPG games for Android mobiles

On any Android phone you can enjoy thousands of free and paid games by downloading them from the Google Play Store. There are narrative titles for those who...

Galaxy Z Flip 4 vs iPhone 13 Pro: Compact folding or conventional top? | Comparative

The Galaxy Z Flip 4 brings the foldable experience into a smaller, more consumer-friendly form factor. The...

Rainbow Six Mobile successfully brings adaptation of the franchise to mobile phones | preview

The game Rainbow Six Mobile was announced in April of this year by Ubisoft, as the adaptation of...

PlayStation Plus continues in the shadow of Xbox Game Pass with the launches

PlayStation Plus, Sony's game subscription service that was born in response to Microsoft's Xbox Game Pass is, as...

Patterns in software development: advantages and disadvantages of the singleton pattern

The singleton pattern is considered a controversial design pattern. It is therefore worth taking a look at the...

l+f: Monomorph – one MD5 hash for everything

Some researchers rely on MD5 hashes to identify malware. An exploit developer provides a tool that always packs shellcode with the same hash. The IT...

Target Open Source Package: Attacks 700 percent more common than three years ago

Open source repositories are increasingly becoming targets for criminals. In the last year alone, Sona type identified over 55,000 infected packages.   Attacks from software supply...
- Advertisement -

Malware: Infection through mouse movement in PowerPoint

IT security researchers have discovered a PowerPoint document that loads and executes malicious code when displayed after a mouse movement. It comes from Russia.   IT...

Chrome 106 web browser: new features and 20 patched security holes

Google fixes 20 security vulnerabilities in the Chrome web browser, some of which are high-risk. In addition, the browser has new functions and improvements.   Google's...
- Advertisement -

Twitter fails with password reset function

When users change their password, it should end active sessions on all devices. Due to an incorrect implementation, this did not take place on...

iX-Workshop: OWASP Top 10 – Securing web applications effectively

An experienced pentester presents the most common vulnerabilities in web applications and explains how to protect yourself successfully. With 10% discount until 11.10.   Web applications...
- Advertisement -