How ToVULNERABILITIES IN SAMSUNG SMARTPHONES ALLOW FOR FULL CONTROL OF THE DEVICEVulnerabilities allow access to data in TrustZone and execute arbitrary code. Specialists of the…Vitus WhiteApril 24, 2020 1 min
How ToUseful features of Viber that you might not have known aboutViber is one of the most popular messengers in the world. Millions of people use it every day. Here…Vitus WhiteApril 23, 2020 1 min
How ToUninstall Program on Windows 10 from CMDCommand Prompt will now launch with administrator permissions. To uninstall a program using Command…Vitus WhiteApril 22, 2020 1 min
Apps & SoftwareTop 7 Biggest data breaches of the 21st centuryAdobe Date: October 2013. Leaked: 153 million user records. Details: As reported in early October…Vitus WhiteApril 21, 2020 4 min
How ToThere is a mass mailing of the Troldesh cipher virus on behalf of Russian companiesGroup-IB experts warn users of increased activity of the Troldesh (Shade) encryption virus. The…Vitus WhiteApril 19, 2020 2 min
How ToThe Yandex search bar gave out the passwords of the medical institutionThe fact is that the data for access to the closed system of the medical institution was sent to the…Vitus WhiteApril 18, 2020 1 min