-
USA: Hive cyber-attack network dismantled ©Shutterstock US and German authorities announced today that they have dismantled one of the world’s largest ransomware attack networks, the “Hive”, which reportedly targeted 1,500 businesses and organizations in 80 countries! US Secretary of State Merrick Garland, in the press conference he gave, said: “Last
-
T-Mobile: Hacker gained access to personal data of 37 million customers © Provided by enikos.gr The “T-Mobile” company said yesterday that a hacker gained access to the personal data of 37 million of its customers. The company said the hacker stole customer data that included names, billing addresses, emails, phone
-
Viber © Provided by enikos.gr Two major worldwide releases —as a new stage in the evolution of business-user interaction through the application— announced Viber (Rakuten Viber). The new features include a searchable “Business Inbox” and a “Business Account”, which will be the next step in Viber’s long-term strategy to become
-
Cybercriminals attack users with 400,000 new malicious files every day ©Provided by sofokleousin.gr In 2022, Kaspersky’s detection systems discovered that an average of 400,000 malicious files were distributed every day, a size that corresponds to an increase of 5% compared to 2021. The number of specific types of threats also
-
© Shutterstock Seven tips for safe online shopping Black Friday is approaching, and many stores are already advertising tempting discounts and other offers. But dealers aren’t the only ones looking for buyers. Fraudsters try to take advantage of this circumstance and extort money from unsuspecting consumers. Cybercriminals lurk and outdo
-
Some experts see webcam covers as a final safeguard, while others don’t see them as useful at all.© Provided by Huffington Post If we’re paranoid about what visual access people can have to us when we’re working, when they shouldn’t, we might wonder if we need a physical camera cover
-
The temperature of our fingers betrays our codes ©naftemporiki.gr Inexhaustible is —as it turns out— the imagination of those who seek to find a way to access our personal information, but, unfortunately, they have the rapid development of technology as their ally, which provides them with the tools to achieve
-
Snapshot of the process of creating the pizza by the robotic mechanism.©naftemporiki.gr An engineer and a chef who worked at “Space X” —Elon Musk’s space company— have joined forces to create “Stellar Pizza”, a robotic system that can make pizzas from scratch and bake them in no time; just five
-
Microsoft: Windows 11 updates start with ‘Start’ menu and ‘video editor’ © Provided by Money Review Microsoft announced on Tuesday that it is starting to roll out the first major update for “Windows 11”, the current version of its PC operating system. Installing the free update will make computers more
-
© iStockphoto There are ways to learn about (and get rid of) malware. The “Predator” has become a constant headline in the “media” of Greece in recent weeks and has been placed at the center of political life; it remains to be seen whether it will also be placed in
-
Instagram’s new features for parents to supervise their children CNN gr The issue that exists regarding the inability of parents to have a view, at least, of what their children are doing on “Instagram” is trying to be solved by “Meta”, which has announced some new tools in this direction.
-
© Shutterstock Cyber-attacks: “Hacktivism”; the #1 risk and the new trends “Check Point Research (CPR)”, the Threat Intelligence division of “Check Point® Software Technologies Ltd. (NASDAQ: CHKP)” —the world’s leading provider of cyber security solutions— released its “Cyber Attack Trends: 2022 Mid-Year Report” report, which highlights how cyber attacks have