IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
DE, t3n.de - Software & Entwicklung

Duolingo-Falle: Diese App macht dich zum Gamer – aber du lernst nicht viel

2025-02-12 23:02

Wie man alle erdenklichen Elemente der Gamification in eine App einbauen kann, zeigt die Sprachlern-App Duolingo ganz virtuos. Zugleich zeigt sie aber auch, wie man damit am eigentlichen Ziel vorbeischießen kann. Dieser Artikel wurde indexiert von t3n.de – Software &…

Read more →

DE, t3n.de - Software & Entwicklung

So viel Strom soll ChatGPT für eine Antwort verbrauchen

2025-02-12 23:02

Eine Suchanfrage bei ChatGPT soll zehnmal so viel Strom verbrauchen als bei Google, hieß es lange. Doch eine neue Studie deutet an, dass dies übertrieben sein könnte. Jedenfalls nach aktuellen Maßstäben. Dieser Artikel wurde indexiert von t3n.de – Software &…

Read more →

DE, t3n.de - Software & Entwicklung

Benchmark-Tests: CPU-Performance von PCs und Notebooks erstmals gesunken

2025-02-12 23:02

Laut CPU-Benchmark-Tests von Passmark ist die durchschnittliche Performance von PCs und Notebooks Anfang 2025 erstmals gesunken. Dafür gibt es verschiedene Gründe; es liegt aber nicht primär an der längeren Nutzung uralter Geräte. Dieser Artikel wurde indexiert von t3n.de – Software…

Read more →

DE, t3n.de - Software & Entwicklung

Konkurrenz für OpenAIs Sora: Mit diesem Adobe-Tool kann jetzt jeder KI-Videos erstellen

2025-02-12 23:02

Adobe integriert die Erstellung von Videos per Text-Prompt oder auf Basis eines Referenzbildes in seine neu gestaltete Firefly-Web-App. Die Basisfunktionen der Video-KI können frei genutzt werden. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen…

Read more →

EN, Search Security Resources and Information from TechTarget

What is antimalware?

2025-02-12 23:02

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is antimalware?

Read more →

EN, Search Security Resources and Information from TechTarget

What is cyber hijacking?

2025-02-12 23:02

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is cyber hijacking?

Read more →

Check Point Blog, EN

A Safer Digital Future: Stopping AI-Fueled Cyber Scams for a more Secure Tomorrow

2025-02-12 23:02

With Safer Internet Day this week, it’s hard not to feel a little extra concern about our kids’ online safety. Today, our children and young adults are living and breathing a digital world that’s evolving faster than ever—one where scammers…

Read more →

DE, heise Security

WTF: ICANN Opfer von Phishing: Online-Konto für Kryptowährungs-Reklame missbraucht

2025-02-12 22:02

“Die ICANN gibt dem Internet seine eigene Währung”, schallte es von einem offiziellen ICANN-Konto eines Sozialen Netzes. Hinter “$DNS” stecken aber Kriminelle. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: WTF: ICANN Opfer von Phishing: Online-Konto…

Read more →

Cybersecurity Insiders, EN

How to Check If Your Gmail Account Has Been Hacked (Step-by-Step Guide to Secure It)

2025-02-12 22:02

Your Gmail account is a critical part of your digital life, making it a prime target for hackers looking to steal personal information, financial data, and credentials. According to a 2023 study by Google, over 15% of internet users have…

Read more →

EN, The Register - Security

Trump’s cyber chief pick has little experience in The Cyber

2025-02-12 22:02

GOP lawyer Sean Cairncross will be learning on the fly, as we also say hi to new intelligence boss Tulsi Gabbard President Trump has reportedly chosen a candidate for National Cyber Director — another top tech appointee with no professional…

Read more →

EN, The Register - Security

Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

2025-02-12 22:02

300+ US companies, 70+ individuals hit by the fraudsters An Arizona woman who created a “laptop farm” in her home to help fake IT workers pose as US-based employees has pleaded guilty in a scheme that generated over $17 million…

Read more →

EN, Silicon UK

Majority Of Businesses Expect A Cyber Breach In 2025

2025-02-12 21:02

Depressing stat. Research from Zscaler reveals that 60 percent of global businesses expect to suffer a cyber breach this year This article has been indexed from Silicon UK Read the original article: Majority Of Businesses Expect A Cyber Breach In…

Read more →

EN, Security | TechRepublic

Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws

2025-02-12 21:02

February’s report on Microsoft patches includes 56 vulnerabilities, two of which are zero-day flaws that have been exploited. This article has been indexed from Security | TechRepublic Read the original article: Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws

Read more →

EN, Security Affairs

Russian cybercriminal Alexander Vinnik is being released from U.S. custody in exchange for Marc Fogel

2025-02-12 21:02

Russian cybercriminal Alexander Vinnik is being released from U.S. custody in exchange for Marc Fogel, a Trump administration source told CNN. The New York Times first reported that Alexander Vinnik, a Russian money laundering suspect, is being released from U.S.…

Read more →

EN, Heimdal Security Blog

5 Best NIS2 Compliance Software and Solution Providers

2025-02-12 21:02

The European Union’s Network and Information Systems Directive 2 (NIS2) is now in effect. And, throughout 2025, governments across the continent will be transposing it into national law. Complying with the regulation involves a combination of changes to workflows, employee…

Read more →

EN, The Register - Security

Ransomware isn’t always about the money: Government spies have objectives, too

2025-02-12 21:02

Analysts tell El Reg why Russia’s operators aren’t that careful, and why North Korea wants money AND data Feature  Ransomware gangsters and state-sponsored online spies fall on opposite ends of the cyber-crime spectrum.… This article has been indexed from The…

Read more →

EN, securityweek

Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware

2025-02-12 21:02

The Italian government denied it hacked seven cellphones with military-grade surveillance technology from Paragon Solutions. The post Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware appeared first on SecurityWeek. This article has been indexed from…

Read more →

hourly summary

IT Security News Hourly Summary 2025-02-12 21h : 5 posts

2025-02-12 21:02

5 posts were published in the last hour 19:32 : When Platforms and the Government Unite, Remember What’s Private and What Isn’t 19:32 : QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech 19:32 : The importance of encryption and…

Read more →

Deeplinks, EN

When Platforms and the Government Unite, Remember What’s Private and What Isn’t

2025-02-12 20:02

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> For years now, there has been some concern about the coziness between technology companies and the government. Whether a company complies with casual government requests for data,…

Read more →

EN, securityweek

QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech

2025-02-12 20:02

QuSecure is pitching a software-based security architecture that overlays onto current networks to help businesses with PQC migration. The post QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Read more →

AWS Security Blog, EN

The importance of encryption and how AWS can help

2025-02-12 20:02

February 12, 2025: This post was republished to include new services and features that have launched since the original publication date of June 11, 2020. Encryption is a critical component of a defense-in-depth security strategy that uses multiple defensive mechanisms…

Read more →

EN, Silicon UK

SEC Files To Pause Legal Battle Against Binance

2025-02-12 20:02

Donald Trump’s crypto friendly SEC seeks to pause high-profile lawsuit against cryptocurrency exchange Binance This article has been indexed from Silicon UK Read the original article: SEC Files To Pause Legal Battle Against Binance

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Why European Regulators Are Investigating Chinese AI firm DeepSeek

2025-02-12 20:02

  European authorities are raising concerns about DeepSeek, a thriving Chinese artificial intelligence (AI) company, due to its data practices. Italy, Ireland, Belgium, Netherlands, France regulators are examining the data collection methods of this firm, seeing whether they comply with…

Read more →

EN, Security News | TechCrunch

Security compliance firm Drata acquires SafeBase for $250M

2025-02-12 19:02

Drata, a security compliance automation platform that helps companies adhere to frameworks such as SOC 2 and GDPR, has acquired software security review startup SafeBase for $250 million. SafeBase co-founders Al Yang (CEO) and Adar Arnon (CTO) will retain their roles,…

Read more →

Page 2085 of 4872
« 1 … 2,083 2,084 2,085 2,086 2,087 … 4,872 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 15h : 3 posts February 7, 2026
  • Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists February 7, 2026
  • Organizations Urged to Replace Discontinued Edge Devices February 7, 2026
  • China-Linked DKnife Threat Underscores Risks to Network Edge Devices February 7, 2026
  • Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details February 7, 2026
  • Study confirms experience beats youthful enthusiasm February 7, 2026
  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists February 7, 2026
  • State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack February 7, 2026
  • Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data February 7, 2026
  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}