Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Your browser has ad tech’s fingerprints all over it • The Register

Your browser has ad tech’s fingerprints all over it • The Register

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

Opinion There are few tech deceptions more successful than Chrome's Incognito Mode. Alongside its fellow travellers in other browsers offering Private Browsing and the like, the name and the impression is given that this is some sort of cloaking mode that...

read more
Bluetooth flaws could let hackers spy through your microphone

Bluetooth flaws could let hackers spy through your microphone

by Syndicated News Feed | Jun 29, 2025 | IT Security | 0 Comments

Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. Researchers confirmed that 29 devices from Beyerdynamic, Bose, Sony, Marshall,...

read more
In cyber, there’s no such thing a ceasefire • The Register

In cyber, there’s no such thing a ceasefire • The Register

by Syndicated News Feed | Jun 28, 2025 | IT Security | 0 Comments

interview The ceasefire between Iran and Israel may prevent the two countries from firing missiles at each other, but it won't carry any weight in cyberspace, according to former NATO hacker Candan Bolukbas. "In the cyber world, there's no such thing as a...

read more
This month in security with Tony Anscombe – June 2025 edition

This month in security with Tony Anscombe – June 2025 edition

by Syndicated News Feed | Jun 28, 2025 | IT Security | 0 Comments

From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news 28 Jun 2025 It's that time of month when ESET Chief Security Evangelist Tony Anscombe looks at the most...

read more
Patients, providers duped in records-and-payment scam • The Register

Patients, providers duped in records-and-payment scam • The Register

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Criminals masquerading as insurers are tricking patients and healthcare providers into handing over medical records and bank account information via emails and text messages, according to the FBI. In a Friday security alert, the federal cops warned the public...

read more
Scattered Spider hackers shift focus to aviation, transportation firms

Scattered Spider hackers shift focus to aviation, transportation firms

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Hackers associated with "Scattered Spider" tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors These threat actors have employed a sector-by-sector approach, initially...

read more
Cisco punts network-security integration as key for agentic • The Register

Cisco punts network-security integration as key for agentic • The Register

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Cisco is talking up the integration of security into network infrastructure such as its latest Catalyst switches, claiming this is vital to AI applications, and in particular the current vogue for "agentic AI." What we did was to imagine if a switch actually...

read more
Hawaiian Airlines discloses ‘cybersecurity event’ • The Register

Hawaiian Airlines discloses ‘cybersecurity event’ • The Register

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

update Hawaiian Airlines said a "cybersecurity incident" affected some of its IT systems, but noted that flights are operating as scheduled. At least one researcher believes Scattered Spider, which previously targeted retailers and insurance companies, could be...

read more
Russia’s throttling of Cloudflare makes sites inaccessible

Russia’s throttling of Cloudflare makes sites inaccessible

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Starting June 9, 2025, Russian internet service providers (ISPs) began throttling access to websites and services protected by Cloudflare, making sites inaccessible from the country. The throttling is so aggressive, reportedly only allowing users to download...

read more
So you CAN turn an entire car into a video game controller • The Register

So you CAN turn an entire car into a video game controller • The Register

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Cybersecurity nerds figured out a way to make those at-home racing simulators even more realistic by turning an actual car into a game controller. The UK's Pen Test Partners (PTP) has an in-house car that's used for various automotive security research. They...

read more
« Older Entries

Categories

  • Graphics Design (6)
  • IT Security (7,138)

Recent Posts

  • Your browser has ad tech’s fingerprints all over it • The Register 06/30/2025
  • Bluetooth flaws could let hackers spy through your microphone 06/29/2025
  • In cyber, there’s no such thing a ceasefire • The Register 06/28/2025
  • This month in security with Tony Anscombe – June 2025 edition 06/28/2025
  • Patients, providers duped in records-and-payment scam • The Register 06/27/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.OkPrivacy policy