ETC-Logo-transparente
ETC-Logo-transparente

Brave Search Launches Its Own Image and Video Search Features

Brave Search

Brave Search, the privacy-focused search engine that aims to compete with Google and Bing, has announced a major update to its service. The search engine now offers its own image and video search capabilities without relying on third-party providers. Read: How Hacktivists Fund Their Operations: A Cybercrime Perspective Previously, users of Brave Search who wanted […]

How Hacktivists Fund Their Operations: A Cybercrime Perspective

Hacktivists

Hacktivism is a form of online activism that uses hacking techniques to promote a political or ideological cause. Hacktivists may target websites, networks, or data of governments, corporations, or other entities that they oppose or want to expose. Read: How to Avoid NFTs Fraud: Tips from the FBI However, hacktivism is not only about disrupting […]

How to Avoid NFTs Fraud: Tips from the FBI

avoid NFT fraud

Non-fungible tokens (NFTs) are unique digital assets that can represent anything from art to music to domain names. They have become a popular way for creators and collectors to monetize their work and passion. However, they have also attracted the attention of criminals who are looking to scam unsuspecting buyers and steal their cryptocurrency and […]

Spotify Down: Users Report Outage on August 4

Spotify

Spotify, one of the world’s most popular music streaming services, experienced a major outage on Thursday, August 4. Many users reported that they could not access the app or play any songs on their devices. Some also complained about error messages and glitches on the Spotify website. Read: How to Protect an Android Device from […]

How to Protect an Android Device from Versioning Attacks

Android Device

Versioning is a common tactic malicious actors use to slip malware on Android devices after evading the Google Play Store‘s review process and security controls. In this blog post, Eagle Tech will explain what versioning is, how it works, and what users can do to protect their devices from it. Read: How to Avoid Losing […]

How to Avoid Losing the Google Account Due to Inactivity

Google Account

Google has recently announced that it will start deleting inactive accounts on December 1st, 2023. This means that any user who has a Google account that they haven’t used or signed into within two years could lose access to data and services. Read: Hawaiʻi Community College Pays Ransom to NoEscape Ransomware Gang Why is Google […]

Hawaiʻi Community College Pays Ransom to NoEscape Ransomware Gang

Hawaiʻi Community College

Hawaiʻi Community College (HCC) has admitted that it paid a ransom to ransomware actors to prevent the leaking of stolen data of approximately 28,000 people. The data included personal and financial information of students, faculty, and staff. HCC is an accredited public community college operating two campuses on the island of Hawaii and is part […]

FIA World Endurance Championship drivers’ data exposed by Le Mans Endurance Management

FIA World Endurance Championship

Le Mans Endurance Management, the company that operates the FIA World Endurance Championship‘s website, has leaked the personal data of hundreds of drivers by leaving their IDs and drivers’ licenses publicly accessible on Google Cloud Storage, according to a report by Cybernews. Read: WormGPT: A New Threat for Business Email Compromise How the data breach […]

WormGPT: A New Threat for Business Email Compromise

WormGPT

Cybercriminals are using a new AI-based tool to create convincing phishing emails and launch business email compromise (BEC) attacks, according to a report by security firm SlashNext. The tool, called WormGPT, is based on the same technology as ChatGPT, a popular chatbot that generates realistic and engaging conversations in multiple languages.  However, unlike ChatGPT, which […]

No more passwords: GitHub rolls out passkey support in public beta

GitHub

GitHub has made a significant step forward in enhancing the security and convenience of its platform by launching passwordless authentication support in public beta. This feature, which is available for users who opt-in, enables them to replace their security keys with passkeys, a new type of credential that works across devices and browsers. Read: Exchange […]