The PC version of Cyberpunk 2077 has received patch 1.12, which fixes a serious security vulnerability we wrote about earlier this week.
video games
Bart Swiatek
February 5, 2021
Modder PixelRick discovered a dangerous vulnerability in Cyberpunk 2077 that, if we install a mod with malicious code, could allow a hacker to take control of a player's computer.
video games
Bart Swiatek
February 3, 2021
Intel has officially presented RealSense ID - Face ID-like face recognition system that can detect fraudsters. The technology can be used, among others, in ATMs.
Tech
Bart Swiatek
January 8, 2021
NordPass regularly updates the list of the most popular passwords used by Internet users. The list was invariably dominated by an immortal classic.
Tech
Bart Swiatek
December 30, 2020
Activision has become a target of hackers. According to numerous sources, data of at least 500 thousand users was leaked as a result of a recent successful hack into the company's servers.
video games
Jacob Blazewicz
September 22, 2020
The Microsoft Defender antivirus program - formerly Windows Defender - received a feature in July that can be used by the user to download viruses from the web. The vulnerability is not dangerous for most computer users, but in some situations it can be used to infect the system with malware.
Tech
Bart Swiatek
September 7, 2020
A lot of information on Facebook can be a health hazard. Avaaz is presenting a report on the increase in harmful content related to the pandemic and medicine in general.
Tech
Arkadiusz Strzala
August 20, 2020
Researchers from Stanford University and the University of Pittsburgh are working on a technology to detect the state of alcoholic intoxication by analyzing the way a smartphone user moves.
Tech
Bart Swiatek
August 19, 2020
Vulnerabilities found in Qualcomm processors are putting more than one billion Android devices at risk.
Tech
Mikolaj Laszkiewicz
August 10, 2020
There has been a major leak of classified data at Intel. A 20-gigabyte package containing, among other things, CPU blueprints and tools used by the company's employees has surfaced online.
Tech
Bart Swiatek
August 7, 2020
Sony intends to introduce a two-step verification option on PlayStation 4, using authentication apps. The feature will debut with the console's software upgrade to version 8.0.
Tech
Jacob Blazewicz
July 25, 2020
Experts from the Chinese company Xuanwu Lab have discovered a dangerous security gap that allows the quick charger to be hacked and consequently used to melt or ignite the device connected to it.
Tech
Bart Swiatek
July 21, 2020
Apple takes our privacy seriously. It will let us choose what we want to share and with whom.
Tech
Mikolaj Laszkiewicz
July 10, 2020
The U.S. Government intends to introduce legislation to address vulnerabilities in the encryption of software used in the country. Back doord hidden in the code would enable the government services to fight crime more effectively.
Tech
Arkadiusz Strzala
June 29, 2020
Microsoft Defender ATP, a security app that so far has been used mainly on desktop systems, has also been launched on mobile platforms. For Android it is now available in the public preview version.
Tech
Arkadiusz Strzala
June 24, 2020
The Australian Prime Minister reported that his country was attacked by hackers. The perpetrators were most likely acting in the service of another, unspecified country. The cyber attack affected many entities in a variety of sectors - from government, through basic services and services, industry, to important infrastructure.
Tech
Bart Swiatek
June 19, 2020
Eric Schmidt, the former CEO of Google, currently serving as chairman of the Pentagon's security innovation committee, believes that Huawei is a threat to global security.
Tech
Bart Swiatek
June 19, 2020
A picture of Apple's anti-theft system in action was posted on Twitter. It blocks the illegally acquired smartphone and tracks its location. The would-be user is also informed that the authorities will be notified about the theft.
Tech
Bart Swiatek
June 3, 2020
Google has recently been testing the ability to confirm purchases in restaurants and in app using the voice recognition function in its voice assistant.
Tech
Mikolaj Laszkiewicz
May 26, 2020
Hackers keep inventing new ways to steal our confidential data. Researchers at Ben Gurion University have reported that cybercriminals may seize files on disks of computers not connected to the Internet!
Tech
May 7, 2020