BloG
Follow our news on security and protectionFacebook is shutting down its facial recognition software
Facebook said Tuesday it plans to stop using facial-recognition software that could automatically recognize people in photos and videos posted on the social network, marking a massive shift both for the tech industry and for a company known for collecting vast amounts...
Leaked Facebook document reveals blacklist of dangerous organizations, individuals
Facebook's blacklist of dangerous individuals and organizations has been leaked to the public according to a recent article published in Fox Business @ A reproduced snapshot, published by The Intercept on Tuesday, features 100 pages of more than 4,000 groups...
Fake COVID vaccine card sales are ramping up online
As more schools, businesses and travel destinations require proof of vaccination, there are growing concerns about fake COVID-19 vaccination cards, according to a recent article published in ABC7NEWS.com Offers to purchase fake COVID-19 vaccination cards are on apps...
The ‘Joker’ Virus Has Returned to Android: It Can Empty Your Bank Accounts Without You Noticing It and It Is Hidden in These Apps in the Google Play Store
The Belgian Police warned about the return of the 'Joker' virus , which attacks Android devices and hides itself in various applications on the Google Play Store . This malware is capable of subscribing the user to...
Apple plans to scan US iPhones for child abuse imagery
Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices....
US companies hit by ‘colossal’ cyber-attack
About 200 US businesses have been hit by a "colossal" ransomware attack, according to a cyber-security firm. Huntress Labs said the hack targeted Florida-based IT company Kaseya before spreading through corporate networks that use its software according to a...
Ransomware gangs’ slow decryptors prompt victims to seek alternatives
Recently, two highly publicized ransomware victims received a decryptor that was too slow to make it effective in quickly restoring the victim's network, according to a recent article published in Bleeping Computer. The first was Colonial Pipeline, which paid a $4.4...
How to secure your banking transactions from cyber frauds
The growing volume of online transactions and the absence of stringent cybersecurity systems give fraudsters the space to commit malicious acts. Technology is almost everywhere. All necessary activities like shopping, grocery orders, bill payments, etc have shifted to...
533 million Facebook users’ phone numbers and personal data have been leaked online
533 million Facebook users' phone numbers and personal data have been leaked onlineThe data includes phone numbers, Facebook IDs, full names, locations, birthdates, bios, and - in some cases - email addresses according to a recent article published in Business...