LIST OF ALL SMART PHONE FORENSICS TOOLS [2020 EDITION] – PART II
Earlier in the post we discussed tools required for smart phone or you can say mobile phone forensics. In this post we will discuss some more tools used in theRead More →
Earlier in the post we discussed tools required for smart phone or you can say mobile phone forensics. In this post we will discuss some more tools used in theRead More →
A group of specialists discovered that some robotic vacuum cleaner models could be abused by threat actors to listen to users’ private conversations remotely. Experts managed to access Lidar readingsRead More →
Cybersecurity specialists have reported detecting three security vulnerabilities in PostgreSQL, the popular object-oriented and open source database management system. According to the report, successful exploitation of these flaws would allowRead More →
A group of people has filed a lawsuit against Google due to the alleged theft of mobile data -allowances from Android users using non approved and undisclosed transmissions to theRead More →
Security specialist Sanjana Sarda performed a thorough analysis of the code of the popular Bumble dating app, discovering multiple API vulnerabilities that could expose the information of the platform’s nearlyRead More →
A database of information from virtually all registered voters in the United States has been leaked. These logs are on sale in various hacking forums, exposing affected users to multipleRead More →
Mobile phone forensics is always a concern when it comes to cyber crime. Most of the cyber crime cases involves mobile phone as an important part of the investigation. ThereRead More →
For several years the interception of mobile communications has become an important field for the defense industry. The “Five Eyes” group, an intelligence alliance between Australia, Canada, New Zealand, theRead More →
Mobile users are increasingly turning to the use of apps to pay for their telephony, pay TV, streaming platforms and even credit fees. Still, many users may fall behind onRead More →
Insurance software provider Vertafore revealed that it was the victim of a data breach after a third party gained access to its networks, exposing information from nearly 28 million Texas-basedRead More →