Telekopye: Hunting Mammoths using Telegram bot Security Analysis of Telegram bot that helps cybercriminals scam people on… rooter September 13, 2023 1 min read 0
Mass-spreading campaign targeting Zimbra users Security ESET researchers have observed a new phishing campaign targeting users… rooter September 13, 2023 1 min read 0
Fingerprints all over: Can browser fingerprinting increase website security? Security Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing… rooter September 13, 2023 1 min read 0
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap Security With powerful AI, it doesn’t take much to fake a… rooter September 13, 2023 1 min read 0
Is backdoor access oppressive? – Week in security with Tony Anscombe Security Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals,… rooter September 13, 2023 1 min read 0
Gathering dust and data: How robotic vacuums can spy on you Security Mitigate the risk of data leaks with a careful review… rooter September 13, 2023 1 min read 0
Quantum computing: Will it break crypto security within a few years? Security Current cryptographic security methods watch out – quantum computing is… rooter September 13, 2023 1 min read 0
Dear all, What are some common subject lines in phishing emails? Security Scammers exploit current ongoing events, account notifications, corporate communication, and… rooter September 13, 2023 1 min read 0
What happens if AI is wrong? – Week in security with Tony Anscombe Security Responses generated by ChatGPT about individual people could be misleading… rooter September 13, 2023 1 min read 0
A new ransomware family called 3AM appears in the threat landscape Security 3AM is a new strain of ransomware that was spotted… rooter September 13, 2023 2 min read 0