Skip to content
CognitiveMetropolis
  • Home
  • Dev

      Latest in Dev

    • Read more about the article How IPFire protects your Family on the Internet

      How IPFire protects your Family on the Internet

      December 2, 2022
    • Read more about the article Pi-Hole on Lightsail with 5 Million Blocked Sites

      Pi-Hole on Lightsail with 5 Million Blocked Sites

      November 14, 2022
    • Read more about the article 2-Day Outage

      2-Day Outage

      November 10, 2022
    • Read more about the article X-Windows, LILO, and Slackware Upgrade

      X-Windows, LILO, and Slackware Upgrade

      October 11, 2022
  • Store
    • Shop Now
    • About Us
    • Contact
    • Shipping and Returns
    • Privacy Policy
  • Account
  • File Downloads
  • 0
0 Menu Close
  • Home
  • Dev
  • Store
    • Shop Now
    • About Us
    • Contact
    • Shipping and Returns
    • Privacy Policy
  • Account
  • File Downloads
  • 0

hacking

  1. Home>
  2. hacking>
  3. Page 2
Read more about the article Your digital footprints could help hackers infiltrate computer networks

Your digital footprints could help hackers infiltrate computer networks

  • Post author:Cognitive Metropolis
  • Post category:Privacy

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns,…

Continue ReadingYour digital footprints could help hackers infiltrate computer networks
Read more about the article FBI accesses US servers to dismantle botnet malware installed by Russian spies

FBI accesses US servers to dismantle botnet malware installed by Russian spies

  • Post author:Cognitive Metropolis
  • Post category:OS/Security

The FBI remotely accessed and disinfected US-located devices running a powerful new strain of Russian state botnet malware, federal authorities said Wednesday. Those authorities added that the Kremlin was using…

Continue ReadingFBI accesses US servers to dismantle botnet malware installed by Russian spies
Read more about the article It’s Time to Treat Your Home Security Cameras as Compromised

It’s Time to Treat Your Home Security Cameras as Compromised

  • Post author:Cognitive Metropolis
  • Post category:IOT/Security

At the end of March, Bitdefender, a leading cybersecurity research firm, published a damning report about Wyze, one of the leading security brands on the market. The charge: That the…

Continue ReadingIt’s Time to Treat Your Home Security Cameras as Compromised
Read more about the article Apple, Meta, and Discord All Handed User Data Over to Hackers. Now What?

Apple, Meta, and Discord All Handed User Data Over to Hackers. Now What?

  • Post author:Cognitive Metropolis
  • Post category:Security

Last week, Meta, Discord, and Apple admitted to a deeply bizarre and troubling mistake: They had all handed user data over to hackers who forged law enforcement emergency data requests…

Continue ReadingApple, Meta, and Discord All Handed User Data Over to Hackers. Now What?
Read more about the article Food Delivery Leak Unmasks Russian Security Agents

Food Delivery Leak Unmasks Russian Security Agents

  • Post author:Cognitive Metropolis
  • Post category:Security

Food Delivery Leak Unmasks Russian Security Agents Russian tech giant Yandex has blamed one of its employees for the hacking and subsequent leak of data from Yandex Food, a popular…

Continue ReadingFood Delivery Leak Unmasks Russian Security Agents
Read more about the article Hardware Flaws require Extra Diligence

Hardware Flaws require Extra Diligence

  • Post author:Cogtropolis
  • Post category:Privacy/Security

Spectre and Meltdown are still relevant, even years after their discovery. Refresh yourself on the status of these hardware flaws to see if you are exposed. Your hardware is now…

Continue ReadingHardware Flaws require Extra Diligence
Read more about the article Why all your IoT devices should be on your guest network

Why all your IoT devices should be on your guest network

  • Post author:Cognitive Metropolis
  • Post category:OS/Security

Many IoT devices — also known as the Internet of Things — don't receive regular updates like a computer or a smartphone would. That includes everything from the smart lock…

Continue ReadingWhy all your IoT devices should be on your guest network
Read more about the article New Xenomorph Android malware targets more than 50 banking and financial applications

New Xenomorph Android malware targets more than 50 banking and financial applications

  • Post author:Cognitive Metropolis
  • Post category:Security

In September 2020, ThreatFabric exposed an Android-based mobile malware dubbed “Alien” that had striking capabilities, such as providing remote access to attackers, controlling SMS messages, stealing notifications, installing or removing…

Continue ReadingNew Xenomorph Android malware targets more than 50 banking and financial applications
Read more about the article Check for Log4j vulnerabilities with this simple-to-use script

Check for Log4j vulnerabilities with this simple-to-use script

  • Post author:Cognitive Metropolis
  • Post category:Security

One great thing about Linux and the open source community is that as soon as a vulnerability is detected, developers are hard at work releasing tools to mitigate the problem.…

Continue ReadingCheck for Log4j vulnerabilities with this simple-to-use script
Read more about the article Log4J shows we must all learn to understand our software

Log4J shows we must all learn to understand our software

  • Post author:Cogtropolis
  • Post category:Dev/OS

This week has led to yet another major vulnerability being discovered in major corporate software stacks, leading to a massive effort to discover, patch, and update. I remember the first…

Continue ReadingLog4J shows we must all learn to understand our software
← Newer Posts
Older Posts →

Read the Article

Recent Posts

  • How IPFire protects your Family on the Internet
  • Pi-Hole on Lightsail with 5 Million Blocked Sites
  • 2-Day Outage
  • How to Convert YouTube Videos to MP3 Files
  • Popular censorship circumvention tools face fresh blockade by China
  • Privacy
  • Contact
  • About Us
Copyright - OceanWP Theme by OceanWP
×
×

Cart