PinnedTony GayaMusic: Stream or Buy?This article is an overall view of an argument with a friend who likes music, or any form of media bought and owned rather than streamed…Feb 21, 2023Feb 21, 2023
PinnedTony GayaFinding a good computer in 2023.A guide to find the computer according to your preference. It will be very useful for future reference.Jan 17, 2023Jan 17, 2023
Tony GayainKafkaesque SecurityGoogle Pixel phones Packed with a Huge Security VulnerabilityAccording to a recent report by the cybersecurity firm iVerify, the majority of Google Pixel phones sold since September 2017 have included…Aug 21Aug 21
Tony GayainKafkaesque SecurityThere’s Spyware in your Phone, and it’s called Temu (the app)Source: Photothek via Getty ImagesAug 19Aug 19
Tony GayainKafkaesque SecurityA Season of Summer Games and a Cyberattack OpportunityThe Paris Olympic Summer Games 2024 ended on August 11, 2024, leaving behind memorable events. However, the organizers faced significant…Aug 13Aug 13
Tony GayainKafkaesque SecurityA Hacker reached a Classroom Management platform and Remotely Wiped 13,000 DevicesA security breach at Mobile Guardian, a global digital classroom management platform, has led to the remote erasure of data on over 13,000…Aug 8Aug 8
Tony GayainKafkaesque SecurityWhat You Need To Know About Flame Stealer: The Social Media MalwareA recent CYFIRMA cybersecurity report has highlighted a new malware known as “Flame Stealer,” reminiscent of a Game of Thrones weapon. This…Jul 29Jul 29
Tony GayainKafkaesque SecurityCrowdStrike Causes Massive IT Outage GloballyMillions of Windows machines are experiencing a Blue Screen of Death (BSOD) issue at boot today, affecting banks, airlines, TV…Jul 19Jul 19
Tony GayainKafkaesque SecuritySignal’s Recent Weak Encryption StateThe well-known encrypted messaging application Signal is currently under scrutiny due to a security vulnerability within its desktop…Jul 8Jul 8
Tony GayainKafkaesque SecurityImportance of Security Patches for Mobile DevicesSource: tripwire.comMay 29May 29