Onegini Updates

Vladimir Ghilien

Recent Posts

06
Oct

Myriad-of-Hacked-IoT-Gadgets-Cause-the-All-Time-DDoS-Attack-Outburst.png

For years, security experts have been cautioning against poor IoT security and that it may have grave consequences. And these days, we can see that these alerts have become reality – botnets composed of hacked IoT gadgets are able to launch distributed denial-of-service (DDoS) attacks of incredible scale.

Read More
28
Jul

However you perceive the reality, the truth is that your data is constantly at risk. And you probably know this already. This includes advertisers, the FBI, hackers, and phishers, and a myriad of snoopers that all strive for access to your digital activity. Although some of them want to – or at least claim they want to – protect you

Read More
21
Jul

As mobile gadgets continuously occupy more and more room in everyone’s lives, mobile security is becoming more and more difficult to handle. Every mobile gadget, whether it’s a tablet or a smartphone, supplies hackers with a new way to intrude into users’ personal space and get to their private data

Read More
29
Apr

Every mobile app store has particular requirements, upon which they base their decision on approving or rejecting mobile applications that aspire to get listed on them. Developers and some users know that Apple uses little more stringent criteria, comparing to Google Play, for example, in terms of app approval.

Read More
28
Apr

Most articles and blog posts written on the topic of Android security concentrate on malware-scanning solutions, usch as Norton, AVG, and Lookout. However, with the protection layers already embedded into the platform, those kinds of applications are mostly unnecessary and frequently inefficient, or even unnecessarily expensive.

Read More
21
Apr

A new batch of security flaws in Android have been fixed by Google. These vulnerabilities could let hackers take over gadgets through malicious apps or remotely.

Read More
21
Apr

Thirteen new Android flaws have been patched by Google. Two of them could permit attackers to gain control over Android gadgets connected to the same wireless network, in case they have Broadcom chips.

Read More
14
Apr

The Islamic State is employing an encrypted Android communication app of its own. This was predicted by specialists that resist government efforts of demanding encryption backdoors to look clearly into correspondence between criminals and know what they are saying to one another.

Read More
14
Apr

Bluebox Security issued a 2015 mobile app survey, where it supports the belief that the majority of consumers would turn aside from vendors, in case their mobile app is compromised, and would take care of their endeavors elsewhere.

Read More
07
Apr

According to the International Data Corporation, or IDC, in 2016, 44% of the world’s population – 3.2 billion people – will be able to access the Internet. Over 2 billion from this number will be accessing the web through mobile devices.

Read More