Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Seven months for IT worker who trashed his work network • The Register

Seven months for IT worker who trashed his work network • The Register

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

A judge has sentenced a disgruntled IT worker to more than seven months in prison after he wreaked havoc on his employer's network following his suspension, according to West Yorkshire Police. According to the police, Mohammed Umar Taj, 31, from the Yorkshire...

read more
Germany asks Google, Apple to remove DeepSeek AI from app stores

Germany asks Google, Apple to remove DeepSeek AI from app stores

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. The commissioner, Meike Kamp, alleges that DeepSeek’s owner, Hangzhou DeepSeek...

read more
Microsoft warns of Windows update delays due to wrong timestamp

Microsoft warns of Windows update delays due to wrong timestamp

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

Microsoft has confirmed a new known issue causing delivery delays for June 2025 Windows security updates due to an incorrect metadata timestamp. As Redmond explains in recent advisory updates, this bug affects Windows 10 and Windows 11 systems in environments...

read more
Your browser has ad tech’s fingerprints all over it • The Register

Your browser has ad tech’s fingerprints all over it • The Register

by Syndicated News Feed | Jun 30, 2025 | IT Security | 0 Comments

Opinion There are few tech deceptions more successful than Chrome's Incognito Mode. Alongside its fellow travellers in other browsers offering Private Browsing and the like, the name and the impression is given that this is some sort of cloaking mode that...

read more
Bluetooth flaws could let hackers spy through your microphone

Bluetooth flaws could let hackers spy through your microphone

by Syndicated News Feed | Jun 29, 2025 | IT Security | 0 Comments

Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. Researchers confirmed that 29 devices from Beyerdynamic, Bose, Sony, Marshall,...

read more
In cyber, there’s no such thing a ceasefire • The Register

In cyber, there’s no such thing a ceasefire • The Register

by Syndicated News Feed | Jun 28, 2025 | IT Security | 0 Comments

interview The ceasefire between Iran and Israel may prevent the two countries from firing missiles at each other, but it won't carry any weight in cyberspace, according to former NATO hacker Candan Bolukbas. "In the cyber world, there's no such thing as a...

read more
This month in security with Tony Anscombe – June 2025 edition

This month in security with Tony Anscombe – June 2025 edition

by Syndicated News Feed | Jun 28, 2025 | IT Security | 0 Comments

From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news 28 Jun 2025 It's that time of month when ESET Chief Security Evangelist Tony Anscombe looks at the most...

read more
Patients, providers duped in records-and-payment scam • The Register

Patients, providers duped in records-and-payment scam • The Register

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Criminals masquerading as insurers are tricking patients and healthcare providers into handing over medical records and bank account information via emails and text messages, according to the FBI. In a Friday security alert, the federal cops warned the public...

read more
Scattered Spider hackers shift focus to aviation, transportation firms

Scattered Spider hackers shift focus to aviation, transportation firms

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Hackers associated with "Scattered Spider" tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors These threat actors have employed a sector-by-sector approach, initially...

read more
Cisco punts network-security integration as key for agentic • The Register

Cisco punts network-security integration as key for agentic • The Register

by Syndicated News Feed | Jun 27, 2025 | IT Security | 0 Comments

Cisco is talking up the integration of security into network infrastructure such as its latest Catalyst switches, claiming this is vital to AI applications, and in particular the current vogue for "agentic AI." What we did was to imagine if a switch actually...

read more
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,391)

Recent Posts

  • Developer jailed for malware that took out his employer • The Register 08/21/2025
  • Dev gets 4 years for creating kill switch on ex-employer’s systems 08/21/2025
  • Colt confirms customer data stolen as Warlock ransomware auctions files 08/21/2025
  • Orange Belgium’s 850K mega-breach raises fraud fears • The Register 08/21/2025
  • FBI warns of Russian hackers exploiting 7-year-old Cisco flaw 08/21/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.