CyberSec & Tech, Cyber Security and Technology News
Providing information on the latest technologies and security.
Search This Blog
SanDisk Reveals a MASSIVE 1 Terabyte SD Memory Card
SanDisk Reveals a MASSIVE 1 Terabyte SD Memory Card
At the Photokina 2016 photography show, Western Digital who are SanDisk’s parent company, recently revealed a prototype of a 1 terabyte SDXC memory card, being the largest SD card in the world.
USB KILL 2.0 - The USB Device Now Available To The Public, Destroys Hardware
A USB device first circulated online as a prototype, designed by Russian researcher Dark Purple, was a USB stick that could essentially destroy sensitive components of a computer within seconds of being plugged in.
Linux vulnerability leaves top sites wide open to attackers
A flaw has recently been discovered in the Linux operating system which allows hackers to terminate, inject malware into communications or downloads between machines connected to the internet.
The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel), is said to pose a serious threat to Internet users, regardless whether or not they use Linux directly.
The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel), is said to pose a serious threat to Internet users, regardless whether or not they use Linux directly.
Labels:
Flaw,
Hack,
Linux,
TCP,
TCP/IP,
Traffic hijack,
Vulnerability
Over 900 Million Android Users Vulnerable to 'Quadrooter' Security Threat
According to Security firm Check Point, The 'Quadrooter' security flaws are said to affect over 900 million Android devices that contain Qualcomm chips, which could provide hackers full control over the affected device.
The four newly-discovered vulnerabilities found in android devices containing Qualcomm chips, would be open to attackers once they have tricked a user into installing a malicious app, one which would not require any special permissions.
New Invention: The Levitating Wireless Phone & Tablet Charger
A new invention levitates your phone or tablet in a slow rotating motion above a wireless charging platform.
The Kickstarter project named OvRcharge, is running to fund a futuristic stylish device that combines induction charging, with magnetic levitation. You simply place your phone on the charging station, and it just hovers there, slowly rotating.
The Kickstarter project named OvRcharge, is running to fund a futuristic stylish device that combines induction charging, with magnetic levitation. You simply place your phone on the charging station, and it just hovers there, slowly rotating.
Ransomware: What Is It? How to Stop It?
Ransomware is malicious software, that an attacker has managed to trick their victim into intercepting on their system. It then holds files hostage on the victims system locked with strong, and often unbreakable encryption, until they reach the payment demanded by the perpetrator. It has become a problem that strikes not only individuals, but also companies.
Whatsapp Encrypted Messages Are Not Permanently Erased When Deleted in App
Back in April this year, WhatsApp announced the introduction of end to end encryption, providing greater privacy protections. However, that sense of security is being challenged by claims that deleted messages are not actually permanently removed, and could be recovered.
5G Wireless Is Coming Soon
Last Wednesday, Verizon announced that it intends to launch their next
generation in wireless internet, 5G ‘wireless fiber’ pilot program, to some
degree in 2017.
Verizon will start testing connections at ranges of less than 500 yards for
high-usage locations.
With mobile data consumption at an all-time high,
social media, on-demand video streaming, SMART devices, and the technological
advances with ‘Internet of Everything’ (IoE),
current standards
would soon fall behind as the increase of connectivity demands more data, and
connection reliability.
Final Day of Free Upgrades to Windows 10
Today, 29th July, is the final day eligible
users with compatible devices that are running genuine Windows 7 Service Pack 1
or Windows 8.1 Update, can upgrade their windows operating systems to Windows
10.
Machines could use more than world's production of electricity by 2040
Scientists have predicted that unless radical improvements are made in the way we design computers, by 2040, computer chips will need more electricity than what our global energy production can deliver.
The projection could mean that our ability to keep pace with Moore's Law, the idea that the number of transistors in an integrated circuit doubles approximately every two years is about to slide out of our grasp.
Welcome to CbyerSec & Tech World!
Here we intend to provide you with the latest information and tips on new technologies, and cyber security.
Keep checking back here with us for more content coming soon!
Keep checking back here with us for more content coming soon!
Subscribe to:
Posts (Atom)