Где бы Вы ни были,
мы всегда готовы помочь с проблемами Вашего ПК

Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform

When you create an app on Azure and wants to make it available on the Internet with a custom domain name, the platform asks users to point their domain’s nameserver to Azure and then claim it [...]

IT Security Vulnerability Roundup – March 2019

The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. Last month’s v [...]

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data

A function that’s hidden away on your Google account could be tracking your every move if you haven’t turned it off. Location History is a list of places you’ve been to, tracked b [...]