Load file service/load exe shop

Previous
Next

the Darkhotel attacks

In the Darkhotel attacks, hackers had access to the provider’s infrastructure, so the offer to install a fake update appeared even before connecting to the

Read all >>>

Scammers on the network

Experienced users know how important it is to update the operating system, browser, and other programs on time. Mozhesheniki use this and create special sites

Read all >>>

public networks

Try not to use public networks: instead, connect via a smartphone or an Internet modem. An LTE connection, a non-roaming tariff, or a local SIM

Read all >>>

Darkhotel project

You arrive at the hotel and connect to the local wireless network. A window appears on the screen with a suggestion to update the flash

Read all >>>

cybercriminal’s motives

The victim’s behavior and the cybercriminal’s motives are closely interrelated. In particular, there is the science of victimology, which tells about the probability of an

Read all >>>

the IT news

If you follow the IT news, you regularly hear that data leaks of customers of large companies are detected, critical vulnerabilities are found in popular

Read all >>>

Boot viruses

Boot viruses infect the boot sectors of floppy disks and the Boot sectors or Master Boot Sector (MBR) of hard disks.Boot viruses are resident viruses.

Read all >>>

4 important rules

4 important rules for improving the protection of your PC from hacker threats Install OS updates. Keep an eye on the state of Windows and

Read all >>>

most promising method

Attackers can get to your computer with the help of file viruses, downloads from the Internet and infected emails. This is the most promising method,

Read all >>>

exploit to download files

The researchers said hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on websites that have File Manager, a

Read all >>>

PowerShell scripts

These scripts, which allow you to download and run malware directly in memory, were used by the hacker group Turla. The method it uses is

Read all >>>

Network hacking attack

Network hacking attack: you can perform network hopping, search for open ports in the system, collect and analyze data packets in the network, and perform

Read all >>>

domain names

Check for domain names, spelling errors in emails or on websites, and unknown email senders. Be careful with files you receive via email from unknown

Read all >>>