• All
  • Android
  • eBooks
  • Freebies
  • Games
  • IOS
  • Linux
  • Mac OS
  • Software
  • Tech NEWS
  • VPNs
  • Windows

February 8 Tech news Roundup ChatGPT Search and Deep Research are ready to rock the internet, Google Gemini 2.0 is here, Malicious mobile apps can use OCR to steal data

Chatgpt Search no longer requires an account This week was very big for Openai, the company has created Chat search Available to all users. The service was previously closed behind a requirement: an Openai account, no longer you need to sign up to an account to reach the AI-operated search engine. Users who want to […]

February 8 Tech news Roundup ChatGPT Search and Deep Research are ready to rock the internet, Google Gemini 2.0 is here, Malicious mobile apps can use OCR to steal data Read More »

Mobile Malware attack used Store apps and OCR to steal cryptocurrency recovery codes | Free Download

Malcutal applications uploaded on Google’s Play Store or Apple’s App Store remain a problem for users worldwide. Google said it blocked more than 2.3 million risky Android apps alone in 2024. Kaspersky Researchers have recently revealed a malware attack. The goal of the sparkcat, which was given by the Kaspaski name, was to obtain a

Mobile Malware attack used Store apps and OCR to steal cryptocurrency recovery codes | Free Download Read More »

Learn Python Programming eBook 4th Edition Worth $38 for Free | Free Download

By Ramkant Learn the Python Programming Ebook written by Fabrizio Romano and Heinrich Kruger, is an excellent resource to start with Python. The fourth version is one This is a post from Techno360. Read Orginal Post: Read Python Programming Ebook 4th Edition for free for $ 38 Source:Techno360

Learn Python Programming eBook 4th Edition Worth $38 for Free | Free Download Read More »

Massive Data Leak Exposes 1.5 Billion Records from Chinese Platforms and Government | Free Download

One of the largest data leaks in recent history has highlighted 1.5 billion records, affecting major Chinese platforms, financial institutions and even government -related institutions. The unsafe dataset discovered by cyberrenus researchers includes sensitive details including full name, government ID number, phone number, financial records and healthcare data. The leaked records originate from several high-profile

Massive Data Leak Exposes 1.5 Billion Records from Chinese Platforms and Government | Free Download Read More »

Microsoft Is Killing Its ‘Free’ VPN—And Raising Prices Too | Free Download

Microsoft has announced that it will close the Microsoft 365 VPN feature in the Microsoft defender for individual and family customers. This decision comes a few days after the subscription prices raised in the board of Microsoft, leaving users with less features despite the increased cost. Initially introduced as part of the Microsoft 365 in

Microsoft Is Killing Its ‘Free’ VPN—And Raising Prices Too | Free Download Read More »

DeepSeek AI Exposed User Data and Chat Histories | Free Download

According to the Cloud Security firm Vij, Deepsek has obtained an open database, exposing sensitive user data, including chat history, API authentication key and system log. Researchers discovered the database within minutes, as it lacked any form of authentication. The unsafe data was stored in an open-source data management system, clicks, which had more than

DeepSeek AI Exposed User Data and Chat Histories | Free Download Read More »

NordVPN’s New Tech Claims to Outsmart VPN Blockers—Here’s How | Free Download

NordVPN has introduced a new protocol, Nordavisper, claiming that it can help users to bypass VPN blocks in areas with restrictions. The company says that Nordavisper works by mimicking regular internet traffic, making it more difficult to detect and block VPN uses for websites and internet service providers (ISPs). VPN is widely used for privacy

NordVPN’s New Tech Claims to Outsmart VPN Blockers—Here’s How | Free Download Read More »

Organizations with dark web presence face significantly higher breach likelihood | Free Download

A study reveals a strong link between dark web exposure and increased cyber security violations, urging organizations to strengthen their protective measures. A recent study conducted by Searchlight Cyber ​​in collaboration with the Marsh McLenn Cyber ​​Risk Intelligence Center has detected a connection between exposure and risks of cyber security violations on the dark web.

Organizations with dark web presence face significantly higher breach likelihood | Free Download Read More »

Bitwarden to enable two-step login for all users in the next days, sort of | Free Download

Bitwardon is a popular open source password management solution that we have mentioned many times in the past. This is one of our recommended password managers. Bitwardon announced Recently it has been changing how users sign in their vaults. By now, users can be divided into two groups: they only sign up with user names

Bitwarden to enable two-step login for all users in the next days, sort of | Free Download Read More »

Cybersecurity Experts Warn of Privacy Risks in Modern Automobiles | Free Download

Hackers revealed serious weaknesses in Subaru’s Starlink Infotainment System, which enables remote vehicle control and sensitive location data access to data A pair of hackers, Sam Curry and Shubam Shah, Is exposed By enduring security weaknesses within Subaru’s Starlink-Kenocated Infotainment system, it enables them to take control of a Subaru Impreza remotely. The pair achieved

Cybersecurity Experts Warn of Privacy Risks in Modern Automobiles | Free Download Read More »

Meet Operator: The Advanced AI Tool That Can Make Purchases and Manage Expenses | Free Download

Openai has introduced a new AI agent to “operator,” to execute online tasks, is currently available to Chatgpt Pro users in America Openai has unveiled the “operator”, “an advanced AI agent designed for autonomous online function execution, currently available as a research preview for the Cutgpt Pro customers in the United States. This innovative equipment

Meet Operator: The Advanced AI Tool That Can Make Purchases and Manage Expenses | Free Download Read More »

North America Faced Majority of Ransomware Incidents in December 2024 | Free Download

In December 2024, ransomware attacks rose to a historic high, marking a disturbed end for the year for cyber security in various fields. The ransomware attacks saw an unprecedented growth in December 2024, registered 574 incidents- the most monthly total was recorded since 2021. This spike came as a shocking news, especially in December, usually

North America Faced Majority of Ransomware Incidents in December 2024 | Free Download Read More »

Cybersecurity Alert: Users Deceived By Fake Google CAPTCHA Pages | Free Download

A new phishing campaign exploits Lumma Steeler Malware, which cheats Windows users with fake Google Captcha pages that execute harmful commands. In an important safety warning, Cyber ​​Security firm Claudsac has unveiled a sophisticated fishing campaign associated with Lumma Steler Malware, targeting Windows users. This approach takes advantage of misleading human verification pages that mimic

Cybersecurity Alert: Users Deceived By Fake Google CAPTCHA Pages | Free Download Read More »

Perplexity Launches extension of free AI App on Google Play Store | Free Download

Perplexity has launched a new mobile app, which changes the AI ​​convenor discovery by enabling users to handle various tasks through relevant dialogues on their equipment. The AI ​​conversion search engine, perplexity, is taking a significant jump in the mobile sector. Free Android app, This new feature enables users to manage different types of functions

Perplexity Launches extension of free AI App on Google Play Store | Free Download Read More »

Scroll to Top