Tag: cybersecurity
Beware of this malware that traps antivirus!
Researchers have discovered a new type of computer malware that attacks all three major operating systems. By pretending to be a system update, it manages to avoid detection. You will…
Private data: Europol ordered to erase the data of innocent people
According to an analysis by the European privacy policeman, Europol keeps vast amounts of personal data of innocent people, going against European regulations. Accused of mass surveillance, the agency has…
A dangerous flaw detected in Google Docs
The Comments feature in Google’s word processing application allows hackers to trick users into carrying out phishing operations. You will also be interested [EN VIDÉO] How to do a Google…
Dozens of sites hacked through simple cloud video player
Hackers have found a way to collect data from clients of real estate agencies. They contaminated websites with malicious code embedded in the player of a cloud video platform. You…
Phishing: what is it?
Malicious practice of pretending to be a reputable site, “phishing” or “phishing”, is a case of identity theft. The aim of the game ? Attract you to a plagiarized site…
Cyberspace: what is it?
A vast term than that of cyberspace! If in the collective imagination, cyberspace is loosely defined as being the equivalent ofInternet, it is a world however much more complex to…
March: Ingenuity threatened by the Log4Shell flaw?
Could the NASA helicopter landed on Mars be hacked? The Apache Foundation tweeted that Ingenuity uses Log4j, the library containing a major security vulnerability. What is it really ? You…
Log4Shell, the flaw that shakes all servers
Hackers have used the discovery of what appears to be the biggest critical vulnerability in Internet history to launch massive attacks on the servers of businesses and organizations around the…
Scientists’ anxiety: malware in neural networks
Neural networks can be silently infected with malware without degrading their performance. No security solution can detect them. Disturbing. You will also be interested [EN VIDÉO] What is a cyberattack?…
Robot portrait of phishing victims
ETH Zurich, together with an unnamed company, has just completed one of the largest phishing studies with more than 14,000 participants over 15 months. This gave researchers a better understanding…