Skip to content
CognitiveMetropolis
  • Home
  • Dev

      Latest in Dev

    • Read more about the article How IPFire protects your Family on the Internet

      How IPFire protects your Family on the Internet

      December 2, 2022
    • Read more about the article Pi-Hole on Lightsail with 5 Million Blocked Sites

      Pi-Hole on Lightsail with 5 Million Blocked Sites

      November 14, 2022
    • Read more about the article 2-Day Outage

      2-Day Outage

      November 10, 2022
    • Read more about the article X-Windows, LILO, and Slackware Upgrade

      X-Windows, LILO, and Slackware Upgrade

      October 11, 2022
  • Store
    • Shop Now
    • About Us
    • Contact
    • Shipping and Returns
    • Privacy Policy
  • Account
  • File Downloads
  • 0
0 Menu Close
  • Home
  • Dev
  • Store
    • Shop Now
    • About Us
    • Contact
    • Shipping and Returns
    • Privacy Policy
  • Account
  • File Downloads
  • 0

cybercrime

  1. Home>
  2. cybercrime
Read more about the article Build a Custom Firewall and WiFi Access Point with IPFire

Build a Custom Firewall and WiFi Access Point with IPFire

  • Post author:Cogtropolis
  • Post category:Dev

What is a Custom Firewall? "Flash Routers" are another term for a custom firewall and WiFi Access Point. They are a form of custom firewall and WiFi access point that…

Continue ReadingBuild a Custom Firewall and WiFi Access Point with IPFire
Read more about the article Immue discovers new vulnerability in Apple’s iCloud private relay

Immue discovers new vulnerability in Apple’s iCloud private relay

  • Post author:Cognitive Metropolis
  • Post category:Security

Immue, an Israel-based cybersecurity company providing holistic anti-bot and anti-fraud defense solutions, claims it’s found concerning vulnerabilities in one of Apple’s latest privacy features — the iCloud Private Relay. While…

Continue ReadingImmue discovers new vulnerability in Apple’s iCloud private relay
Read more about the article FBI accesses US servers to dismantle botnet malware installed by Russian spies

FBI accesses US servers to dismantle botnet malware installed by Russian spies

  • Post author:Cognitive Metropolis
  • Post category:OS/Security

The FBI remotely accessed and disinfected US-located devices running a powerful new strain of Russian state botnet malware, federal authorities said Wednesday. Those authorities added that the Kremlin was using…

Continue ReadingFBI accesses US servers to dismantle botnet malware installed by Russian spies
Read more about the article Apple, Meta, and Discord All Handed User Data Over to Hackers. Now What?

Apple, Meta, and Discord All Handed User Data Over to Hackers. Now What?

  • Post author:Cognitive Metropolis
  • Post category:Security

Last week, Meta, Discord, and Apple admitted to a deeply bizarre and troubling mistake: They had all handed user data over to hackers who forged law enforcement emergency data requests…

Continue ReadingApple, Meta, and Discord All Handed User Data Over to Hackers. Now What?
Read more about the article Why all your IoT devices should be on your guest network

Why all your IoT devices should be on your guest network

  • Post author:Cognitive Metropolis
  • Post category:OS/Security

Many IoT devices — also known as the Internet of Things — don't receive regular updates like a computer or a smartphone would. That includes everything from the smart lock…

Continue ReadingWhy all your IoT devices should be on your guest network
Read more about the article New Xenomorph Android malware targets more than 50 banking and financial applications

New Xenomorph Android malware targets more than 50 banking and financial applications

  • Post author:Cognitive Metropolis
  • Post category:Security

In September 2020, ThreatFabric exposed an Android-based mobile malware dubbed “Alien” that had striking capabilities, such as providing remote access to attackers, controlling SMS messages, stealing notifications, installing or removing…

Continue ReadingNew Xenomorph Android malware targets more than 50 banking and financial applications
Read more about the article Check for Log4j vulnerabilities with this simple-to-use script

Check for Log4j vulnerabilities with this simple-to-use script

  • Post author:Cognitive Metropolis
  • Post category:Security

One great thing about Linux and the open source community is that as soon as a vulnerability is detected, developers are hard at work releasing tools to mitigate the problem.…

Continue ReadingCheck for Log4j vulnerabilities with this simple-to-use script
Read more about the article Ransomware in 2022: We’re all screwed

Ransomware in 2022: We’re all screwed

  • Post author:Cognitive Metropolis
  • Post category:Security

Ransomware is now a primary threat for businesses, and with the past year or so considered the "golden era" for operators, cybersecurity experts believe this criminal enterprise will reach new…

Continue ReadingRansomware in 2022: We’re all screwed

Read the Article

Recent Posts

  • Google Says It Doesn’t ‘Sell’ Your Data. Here’s How the Company Shares, Monetizes, and Exploits It. | Electronic Frontier Foundation
  • How to ByPass the TikTok Ban
  • How IPFire protects your Family on the Internet
  • Pi-Hole on Lightsail with 5 Million Blocked Sites
  • 2-Day Outage
  • Privacy
  • Contact
  • About Us
Copyright - OceanWP Theme by OceanWP
×
×

Cart