


The vulnerability would allow a remote attacker to add or modify arbitrary files within the context of Apple’s Mail application.
This could be used to leak sensitive information or change mail client settings. Researcher Mikko Kenttälä explains in his blog the technical details of the vulnerability, which was already fixed by Apple in July last year. Although the technical details could not be...
Amazon is not celebrating its 30th birthday with gifts: this WhatsApp message is a scam.
A new phishing campaign is circulating on WhatsApp that aims to steal your personal details and install malware on your phone. If you get this message, delete it and do not follow the link because it is a scam. WhatsApp is the most widely used instant messaging...
Ransomware, cryptojacking and loT malware on the rise
COVID-19 has given threat actors a great opportunity to carry out more aggressive and numerous attacks with do-it-*yourself cloud-based tools. In 2020 there was a 62% increase in ransomware, 28% increase in cryptojacking and 66% increase in loT malware, as well as a...
Wifi 6 and 6E explained: how they make corporate networks more efficient, secure and faster.
Wifi 6 technology is designed to manage the simultaneous connection of a large number of devices on a single wireless network. Greater coverage in spaces with a high density of users. A more secure Wifi network: WPA3 makes the difference. More throughput: up to 9.6...