Israeli hackers find method to break Signal encryption
According to a recent report, specialists at Cellebrite, an Israeli mobile security firm, claim to have found a way to access the Signal messaging app, which has the highest levelRead More →
According to a recent report, specialists at Cellebrite, an Israeli mobile security firm, claim to have found a way to access the Signal messaging app, which has the highest levelRead More →
Most of the latest smartphone models feature a fingerprint scanner to unlock the device, access apps, and more utilities. Although it seems to be the ideal form of user authentication,Read More →
Online platforms are increasingly setting requirements for creating user passwords; uppercase and lowercase; use of random numbers and special characters alternated with letters. Handling this information can be difficult, butRead More →
After some accusations against the adult site Pornhub for allegedly hosting child pornography, companies such as Mastercard and Visa decided to revoke their card payment services on this platform. ThisRead More →
Valve, a video game developing company, has fixed four critical flaws on Steam, its popular online video game platform. If exploited, these vulnerabilities would allow remote threat actors to blockRead More →
A SpiderLabs researcher has published an analysis of WinZip 24 network communications in which he detected the sending of update verification requests in unencrypted HTTP format. This could allow threatRead More →
Termux is a terminal emulator for Android, which works directly without the need of rooting or make complicated configurations, although sometimes its use can be confusing for the uninitiated. ThisRead More →
A number of firmware flaws in D-Link VPN routers could expose these devices to zero-day attacks exploitation. These vulnerabilities have not been fully fixed, so threat actors could launch rootRead More →
Netgain, a cloud hosting company, has had to disconnect some of its data centers as a result of a recent ransomware attack. This firm offers web hosting and other cloudRead More →
© 2026 All Rights Reserved
info@iicybersecurity.com