Blog
Facebook introduced a new protocol for encrypting chat conversations
The Facebook company published on the portal GitHub the code for a new encryption protocol for group chat with increased reliability, which was named Asynchronous Ratcheting Tree (ART).
According to the authors of the project – a group of researchers from ...
Hundreds of sites use malicious WordPress plugins 3 years after they are discovered
14 malicious plug-ins have been removed from the official WordPress catalog by the end of 2014
Cyber security experts from the company White Fir Design reported that several hundred sites continue to use 14 malicious plug-ins WordPress after almost three ...
Google will start filtering bad ads in Chrome
Chrome browser will have a built-in ads blocker.
Google reported that, as of February 15, 2018, a special filter will remove ads that can cause users inconvenience.
Formats that do not meet the standards set by the Coalition for Better ...
Facebook fights extortion of likes
The administration of Facebook is taking new measures to protect data – the social network introduced a special algorithm for recognizing faces.
It will help users in time to find out that their photos have been published, even if they ...
Malware Wp-Vcd is distributed through “pirate” themes for WordPress
At the end of November 2017,Security specialists discovered a new malware Wp-Vcd
Wp-Vcd attacks sites running WordPress. The malware uses known vulnerabilities in plug-ins or CMS for attacks and they mask themselves as a legitimate WordPress files. If the attack ...
Phishing sites are moving to HTTPS
Phishing with false SSL certificates becomes massive – up to a quarter of fake sites are hosted on HTTPS-domains
“Kaspersky Lab” recorded tens of millions of threats only in the third quarter. The green lock does not guarantee the authenticity ...
The Firefox browser will mark websites that were previously hacked
Firefox will get a useful feature
The developers of Firefox are working on a new feature that will warn you if you visit a site that has been attacked by hackers.
Information for notifications web browser will be taken from the ...
OWASP named the most serious risks for Web applications
Participants in the Open Web Application Security Project (OWASP) have compiled another list of the most dangerous threats for Web applications
Participants in the Open Web Application Security Project (OWASP) have compiled another list of the most dangerous threats for ...
A new unCAPTCHA system can bypass 450 reCAPTCHA in less than 6 seconds
unCAPTCHA is a new automated system developed by experts from the University of Maryland at College Park, able to bypass reCAPTCHA from Googleinfo-icon with an accuracy of 85%
This is due to the audio version of the hint for people ...
Monero Miners use Google Tag Manager
Attackers distribute the Coinhive Miner using Google Tag Manager
Monero hunters, specializing in the introduction of the Coinhive Miner, have adopted the Google Tag Manager.
As the security researcher Troy Mursch told The Register, he discovered Coinhive on the website of ...
In the popular WordPress plugin Formidable Forms are found and fixed critical vulnerability
The popular Formidable Forms plug-in, available in both free and paid versions, has more than 200,000 active installations. The plugin offers website owners a tool for creating contact pages, polls, polls and other forms
The well-known Finnish researcher Jouko Pynnönen, ...
Google Advanced Protection: more protection at the expense of convenience
A week ago, on October 17, Google introduced enhanced security features for the Gmail account, targeting primarily civil servants and journalists using the company’s services. Experts do not consider the panacea a new set of tools for Advanced Protection, but ...
Announced new security features of Chrome, the engine ESET among them
Yesterday, Googleinfo-icon announced three new security features of the Chrome browser
The features which will help to detect and combat malicious extensions and programs.
First of all, Chrome will detect the addition of changes to the user’s default settings. These include ...
Oracle fixed 20 dangerous vulnerabilities in Java SE
In total, Oracle fixed 252 vulnerabilities in its products
Oracle released the October security update Critical Patch Update 2017, which fixes a total of 252 vulnerabilities in a number of products, including Oracle Database Server and Java SE.
The company ...
Hackers scan sites in search for private SSH-keys
A publication of a report on the lack of adequate protection for SSH led to an unexpected surge of scans
Hackers scanned Web sites running WordPress in search for directories containing private SSH keys, in order to hack them with ...