Tag: cybersecurity
The built-in browsers of these social networks can monitor all your internet activity
The browsers integrated into certain social network applications could collect a multitude of data through JavaScript code injected directly into web pages. This code would contain functions to collect all…
This DIY device can tell you if you’re being followed on the street
A cybersecurity specialist has created a device that can detect nearby smartphones, tablets and connected objects. Its system is based on consumer components, which many geeks may already have at…
Paralyzed by a cyberattack, the Corbeil-Essonnes Hospital Center will not pay a ransom
During the night from Saturday to Sunday, the South Ile-de-France Hospital Center was hit by a cyberattack, and the hackers are demanding a ransom of ten million dollars to restore…
Tiktok, Instagram, Facebook: their built-in browsers on mobile can monitor all your web activity
The browsers integrated into certain social network applications could collect a multitude of data through JavaScript code injected directly into web pages. This code would contain functions to collect all…
How Google thwarted the biggest cyberattack in history
You will also be interested [EN VIDÉO] What is a cyberattack? With the development of the Internet and the cloud, cyberattacks are becoming more frequent and sophisticated. Who is behind…
To Avoid Being Hacked, Update Your Mac and iPhone
You will also be interested [EN VIDÉO] What is a cyberattack? With the development of the Internet and the cloud, cyberattacks are becoming more frequent and sophisticated. Who is behind…
DL Aiuti, AIIP: “insufficient measures” for cybersecurity
(Finance) – AIIP – Italian Internet Provider Association expresses satisfaction for the approval, within the “DL Aiuti” of a standard, Article 37, which deals with the issue of the reaction…
The ultimate technique to detect deepfakes
Faced with the proliferation of real-time deepfakes, a company has determined two simple methods to find out if your interlocutor is really who he claims to be. Simply ask him…
Think like hackers to strengthen security
In order to develop defense mechanisms, MIT researchers studied the weak point of Intel Xeon and Intel Core X server processors. They discovered how to attack the component that manages…
The ultimate technique to spot a deepfake
Faced with the proliferation of real-time deepfakes, a company has determined two simple methods to find out if your interlocutor is really who he claims to be. Simply ask him…