Taking control of a network by hacking a Philips Hue bulb
An information security firm reported the finding of a new vulnerability in Philips Hue devices that, if exploited, would allow a hacker to take control of a light bulb toRead More →
An information security firm reported the finding of a new vulnerability in Philips Hue devices that, if exploited, would allow a hacker to take control of a light bulb toRead More →
Sometimes researchers and cybersecurity specialists don’t detect security flaws in some technological developments until they hit the market. In the worst cases, the first to detect these flaws or securityRead More →
For most cryptocurrency enthusiasts and digital forensics specialists, storing virtual assets without an Internet connection (a practice usually known as cold storage) is the most secure way to hold theseRead More →
The developers of Kali Linux, one of the most widely used distributions for ethical hacking in the world, have just announced the release of Kali 2020.1, this year’s first majorRead More →
A few days ago Microsoft announced the end of support for Windows 7, so the operating system would no longer receive free security updates, although apparently there are many interestedRead More →
For the development of its day-to-day operations, the United Nations (UN) employs multiple technological developments with the highest information security standards, including a vulnerability bounty program to solve security flawsRead More →
Using Social Media platforms in Cyber Criminal activity is very common from last decade. Creating fake profiles with same name, details and it looks same replica of the original. FacebookRead More →
Although tech companies always seem to be moving forward, they sometimes have to take more measured positions. This appears to be the case of Google and Alphabet Inc, its parentRead More →
Back in 2016, the US Army managed to stop a massive online propaganda campaign deployed by the Islamic State. For this, the armed forces designed a complex hacking operation againstRead More →
This is a very serious disclosure for the data protection and privacy of Apple users. International media report that, after receiving a complaint from the FBI, the tech company abandonedRead More →
The methods used to secure technological developments can sometimes seem drastic. Web application security specialists report that an anti-hacking watchdog has threatened to reveal the code base of the popularRead More →
One of the main reasons why governments and financial institutions refuse to accept virtual asset transactions is their potential use for illicit purposes. Cybersecurity firm Chainalysis shows this in itsRead More →
As the security measures applicable to computer systems advance, new malicious hacking methods are also developed, so it is vital for technology companies to protect their creations with the bestRead More →
Combating crimes such as possession of child pornography is a complex task and often limited by the privacy, data protection and cybersecurity measures for tech device users, although Apple seemsRead More →
A new application for quantum computing could be just around the corner. During the 2020 Consumer Electronics Show (CES) in Las Vegas, ISARA Corporation, in collaboration with car developer Karma,Read More →
The famous tech company Apple has recently filed a copyright infringement lawsuit against Corellium, a company specializing in web application security and operating system virtualization. The technology firm accuses CorelliumRead More →
The price of smart TVs has been significantly reduced in the most recent months, although this has little to do with offers or large quantities in stock of these devices.Read More →
Good news for the ethical hacking community. The developers of BlackArch Linux have just announced the release of new ISO and OVA images for the specialized operating system for pentestingRead More →
Piracy is the main problem the videogame industry has faced since its beginning. Currently, video game hacker groups take on average a month to release cracked versions of the latestRead More →
Video game developers are increasingly investing time and resources in protecting these products, nevertheless, hacker groups always find a way to remove pre-installed security restrictions to release pirate versions afterRead More →