How can you check if you have spyware on your mobile

The “Predator” has become a constant headline in the “media” of Greece in recent weeks and has been placed at the center of political life; it remains to be seen whether it will also be placed in that of political developments. The software that monitors our mobiles appeared as the Διαβάστε Περισσότερα …

Cyber-attacks: “Hacktivism”; the #1 risk and the new trends

“Check Point Research (CPR)”, the Threat Intelligence division of “Check Point® Software Technologies Ltd. (NASDAQ: CHKP)” —the world’s leading provider of cyber security solutions— released its “Cyber ​​Attack Trends: 2022 Mid-Year Report” report, which highlights how cyber attacks have become a state-level weapon —including the new method “ransomware” “Country Extortion” Διαβάστε Περισσότερα …

The first quantum circuit is a fact

It took nine years to make this miracle of technology, nine difficult years for the pioneer Australian scientists. The impossible became reality. Now the “quantum chip” will be able to be inserted into a computer and operate at incredible speeds. Think what the future holds for computers and technology after Διαβάστε Περισσότερα …

The American Frontier most powerful supercomputer in the world

The United States has returned to the top of the supercomputers, displacing Japan, thanks to the new powerful supercomputer “Frontier“, of the “Oak Rigde National Laboratory (ORNL)”, of the US Department of Energy in Tennessee, which took first place in the “Top 500” ranking of the most powerful and fastest Διαβάστε Περισσότερα …

How will you know if you are being spied on through your device’s camera

As part of our digital lives, we are increasingly sitting in front of a screen, whether it is a laptop, smartphone or other device. This usually means that we are also sitting in front of a camera that —before the pandemic— most of us rarely used. But, while webcams can Διαβάστε Περισσότερα …

The Peaky Blinders of the 21st century have been arrested

At the beginning of the 20th century, the Birmingham-based “Peaky Blinders” gang was active in Britain, which became famous thanks to the worldwide success of the TV series of the same name. London police say they have dismantled a hacker mob called “Lapsu$”. Seven key members of the mob have Διαβάστε Περισσότερα …

MIT manufactures the first fabrics that “eavesdrop”

Thanks to the special fibers, this fabric effectively detects the sounds of the environment, from the loud ones on a busy road, to the quiet sounds inside a library reading room. At the same time, the fabric is also capable of recording the sounds it hears and then reproducing them Διαβάστε Περισσότερα …

Quantum radar detects objects under the ground

An object hidden beneath the earth’s surface was first detected using quantum technology. The achievement is characterized as a milestone, as it paves the way for the use of quantum gravity sensors that will “see” under the ground, a development with a variety of applications in science, industry, national defense Διαβάστε Περισσότερα …

ESET: How hackers can “steal” passwords

“Passwords” are the Achilles heel of many people’s digital lives, especially at a time when the average person has to remember dozens of “passwords”, and that number has grown steadily in recent years. “Passwords” are the virtual “keys” for the digital world, offering access to electronic banking, e-mail, social networking Διαβάστε Περισσότερα …

Shopping, scams and internet

If you receive a reminder for orders that you have never made, then it is very likely that you have fallen victim to cybercriminals. Internet shopping is a practice for many people, especially in the run-up to Christmas and in the face of tougher measures for the coronavirus in retail. Διαβάστε Περισσότερα …

The worst passwords of 2021 are proof that we deserve to be hacked

The company “NordPass” conducts every year a research for the most dangerous “passwords” that one can use. On one hand, data is extracted that makes our “login” more secure —where it requires a “password”— and on the other, it is an awareness campaign, for those who still insist on using Διαβάστε Περισσότερα …

How cybercriminals exploit “vulnerabilities”

“HP Wolf Security” threatening team is ringing a “bell” for the speed with which cybercriminals mobilize to exploit new “zero day” vulnerabilities —before businesses can update their systems— in the context of the publication of the “HP Wolf Security Threat Insights” World Expo. As stated in a relevant announcement: ““Zero-day Διαβάστε Περισσότερα …