-
Home
-
News
-
Ansa.it (italian)
- Homepage
- Cronaca
- Mondo
- Economia
- Sport
- Cinema
- Tecnologia
- Ultima ora
- English news
- Foto
- Video
- Abruzzo
- Basilicata
- Calabria
- Campania
- Emilia Romagna
- Friuli Venezia Giulia
- Lazio
- Lombardia
- Marche
- Molise
- Piemonte
- Puglia
- Sardegna
- Sicilia
- Toscana
- Tretino Alto Adige \ Sudtirol
- Umbria
- Valle d' Aosta
- Veneto
- Ambiente ed Energia
- Motori
- Terra & Gusto
- Salute e Benessere
- Scienza e Tecnica
- Europa
- Nuova Europa (IT)
- Nuova Europa (EN)
- Viaggiart
- CNN
- Various
-
Ansa.it (italian)
-
Software Development
-
Dzone
- AI\ML Zone
- Agile Zone
- All contents
- Big Data Zone
- Career Development Zone
- Cloud Architecture Zone
- Containers
- Data Zone
- Database Zone
- Deployment Zone
- DevOps and CI/CD
- Dzone Home
- Frameworks
- Integration
- IoT
- Java
- Javascript
- Languages
- Maintenance
- Methodologies
- Microservices
- Monitoring and Observability
- Open Source
- Performance
- Publications
- Security zone
- Team management
- Testing, Tools, and Frameworks Zone
- Tools
- Web Dev
- Frontend Development
- Java
- PHP
- Python
- Sofware Engineers
-
Dzone
-
AI
-
Cyber Security
- Threat Post
-
Websites
- Cisco Blog
- Cisco Security
- Cybersecurity 360
- Daniel Miessler
- Dark reading
- Darknet.org
- EC Council
- GBHackers On Security
- Google Online Security Blog
- Graham Cluley - Cybersecurity and AI keynote speaker
- Guardian computer security
- HackRead
- Hacker Combat
- Help Net Security
- IT Governance Blog
- IT Security Central
- ImmuniWeb - Cybercrime Investigations Weekly
- Kali Linux
- Krebs on Security
- Naked Security
- Schneier on Security
- Search Security
- Securelist.com
- Security Affairs
- Security Gladiators
- Security Week
- Seqrite Blog
- TRUSTe Blog
- The Hacker News
- Threat Insight Blog
- Trend Micro
- Zero Day | ZDNet
-
Gaming
Mobile Security – Threatpost
The First Stop For Security News
iPhone Users Urged to Update to Patch 2 Zero-Days
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under att...
Posted on 19 August 2022 | 3:25 pm
Xiaomi Phone Bug Allowed Payment Forgery
Mobile transactions could’ve been disabled, created and signed by attackers.
Posted on 16 August 2022 | 12:26 pm
Google Boots Multiple Malware-laced Android Apps from Marketplace
Google removed eight Android apps, with 3M cumulative downloads, from its marketplace for being infected with a Joker spyware variant.
Posted on 18 July 2022 | 12:32 pm
Leaky Access Tokens Exposed Amazon Photos of Users
Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
Posted on 29 June 2022 | 8:18 pm
Google Warns Spyware Being Deployed Against Android, iOS Users
The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs.
Posted on 24 June 2022 | 11:02 am
Kazakh Govt. Used Spyware Against Protesters
Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders.
Posted on 21 June 2022 | 12:48 pm
iPhones Vulnerable to Attack Even When Turned Off
Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
Posted on 17 May 2022 | 1:19 pm
Mozilla: Lack of Security Protections in Mental-Health Apps Is ‘Creepy’
Popular apps to support people’s psychological and spiritual well-being can harm them by sharing their personal and sensitive data with third parti...
Posted on 3 May 2022 | 12:42 pm
‘CatalanGate’ Spyware Infections Tied to NSO Group
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.
Posted on 19 April 2022 | 4:04 pm
Protect Your Executives’ Cybersecurity Amidst Global Cyberwar
In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives in order to reduce the company’s ...
Posted on 19 April 2022 | 2:07 pm