Unexpectedly, a hacker group with a Chinese background launched a public attack on The Conversion, an online platform for confidential data exchange. The group, known as the Highly Secure Five Eyes Alliance,…
Category: English
US Cyber Alert: China Threats
The US State Department has issued a cybersecurity alert warning of potential threats from China to critical infrastructure such as pipelines, rail systems and power grids. These malicious cyber activities are used…
Securing Cars from Cyber Threats
Hyundai and Kia have been striving to strengthen their auto cybersecurity, however, they remain vulnerable to exploitation by con artists and criminals. Criminals are able to access the vehicles’ computers and control…
2FA Mandatory for PyPI
PyPI, the official third-party software repository, is requiring all accounts that maintain projects on the repository to turn on two-factor authentication (2FA) by the end of the year. This includes organization maintainers,…
Sophisticated Phishing Rises
Phishing attacks are becoming increasingly sophisticated and dangerous. A new technique known as “file archiving in the browser” has been uncovered that could be used to trick people into downloading malicious files….
Maldocs Threat to Windows
A newly discovered malware called Maldocs has been identified as a threat to Windows-based computers. It is spread through malicious emails, links, and files, and is able to evade detection by using…
Protect Against Malware
Recently, a new type of malicious software has been discovered that can cause serious harm to computer systems. This malicious software, called “malware,” is capable of infiltrating computers and networks and stealing…
Revolutionizing Renewables
Unleashed Computing is a state-of-the-art technology which uses machine learning to develop a more efficient approach to obtaining power from renewable sources. This technique, known as “Kermin-style power dissipation”, works by forecasting…
Russian Response: A Comprehensive Plan
The pandemic has caused a great deal of disruption all over the world. In response, many governments have implemented quarantines, travel restrictions, and other measures to help curb the spread of the…
Protect Against Cyber Threats
Cyber criminals are taking advantage of a weakness in Microsoft WordPad to infect Windows machines. WordPad is a program that comes pre-installed on Windows computers. The vulnerability permits attackers to execute malicious…