How to hack with WebEx
A flaw in WebEx allows you to access the complete scheme of a company. Some time ago, Karl Fosaaen, an expert in digital forensics published a very interesting research onRead More →
A flaw in WebEx allows you to access the complete scheme of a company. Some time ago, Karl Fosaaen, an expert in digital forensics published a very interesting research onRead More →
For most people it is difficult to determine what is “normal” when looking for signs that reveal a compromised host. This is easily one of the biggest problems that digitalRead More →
This tool focuses on exposing the sites that generate misinformation. It is easier to expose those who generate misinformation than to speak out against each of their lies. This is the new approach by MIT cybersecurity and digitalRead More →
Passwords like “admin” or “password” set by default will be illegal in 2020 The state of California has recently passed a law that establishes higher safety standards for any device connected to the network that is manufactured or soldRead More →
The company sold encrypted BlackBerry devices that were used by criminal organizations around the world, including the Sinaloa drug cartel Last march, specialists in digital forensics reported that the FBIRead More →
This attack reached about 30 organizations in the US, including Apple and Amazon Amazon began to evaluate a startup company called Elemental Technologies, as potential purchase thinking about its expansionRead More →
Details about this operation of massive bank robbery are revealed Researchers from a security and digital forensics firm have publicly disclosed some details about how a team of North Korean hackers, christenedRead More →
Relevant information on the most recent threat of this dangerous hacking group Recently, the findings of digital forensics specialists have been published on a new cyberattack campaign launched by theRead More →
More than 11k sites were attacked A Californian man pleaded guilty of hacking multiple military and government websites in a campaign allegedly linked to the political situation in Gaza, asRead More →
WiFi 6 includes functions that make it stable in any environment The new WiFi 6, based on the IEEE 802.11ax standard, enables next generation WiFi connectivity. According to specialists in digitalRead More →