Hackers attack Cathay Pacific
Data belonging to millions of passengers is compromised Digital forensics experts from the International Institute of Cyber Security report that one of Asia’s major airlines has just discovered that itRead More →
Data belonging to millions of passengers is compromised Digital forensics experts from the International Institute of Cyber Security report that one of Asia’s major airlines has just discovered that itRead More →
The flaw, still unpatched, allows an attacker to delete any type of file on a machine, including system data A cybersecurity and digital forensics researcher has published a proof-of-concept forRead More →
Payment card information of more than 180k people could have been stolen Details on a second cyberattack incident against British Airways airline have been recently disclosed. According to experts in digital forensics,Read More →
Russian hackers would have launched the Triton malware campaign against various facilities in Saudi Arabia A few days ago experts in digital forensics reported the existence of a new malwarecalled GreyEnergy,Read More →
Malware researchers always test their android users by introducing mobile banking Trojans into the Google Play store. There are lot of apps you can found in official Google play storeRead More →
Sandboxescaper has shown an new flaw in Windows that make all users vulnerable. Till now Microsoft has not address this issue to the windows users or has make any securityRead More →
After the insurance firm suffered a cyberattack, the Mexico central bank raised the security alert level in the operation of its payment systems Experts in digital forensics from the InternationalRead More →
The car was stolen in Essex using a relay technique During the early hours of last Sunday morning, two masked cybercriminals began to maraud around a Tesla Model S onRead More →
Tracking and analysis on Twitter Experts in digital forensics introduce Twitter Intelligence, open source intelligence (OSINT) project written in Python to carry out Twitter tracking and analysis tasks without using the TwitterRead More →
The operating system ignores requesting user confirmation to overwrite existing files in a location The Windows 10 updates launched in October 2018, also known as Build 1809, has presented countless errors sinceRead More →
According to experts, many municipalities attacked with ransomware do not have many options when facing such an incident The city of West Haven, Connecticut, made the difficult decision to payRead More →
This government institution is opting to work with ethical hackers and their researches to protect vulnerable medical devices The work of malicious hackers has become a latent concern in today’sRead More →
Chinese government asks to register users’ real names, posts censorship and store user data People in China will need to register their real names before they can use any blockchain-based onlineRead More →
Only 6% of the comments received were legitimately sent New York Attorney General Barbara Underwood subpoenaed 14 companies and organizations as part of a state research on the surge ofRead More →
Data collection and exchange through mobile applications are out of control, experts warn A research conducted by cybersecurity and digital forensics specialists estimates that almost 90% of the free appsRead More →
Different ways of exploiting the flaw have been widely spread too Out of the thousands of plugins for the jQuery framework, one of the most popular has hosted for at least threeRead More →
Attackers target critical servers using three of the NSA-developed hacking tools, including DarkPulsar, which were leaked by the Shadow Brokers hacking group According to reports of experts in digital forensics,Read More →
The implementation of e-voting has generated both advantages and technological risks Technology provides us countless comforts, but it also cements the way for scammers and cybercriminals to take advantage ofRead More →
This library is used by popular media players, along with a series of integrated devices with streaming capacities Cybersecurity and digital forensics researchers report the finding of a critical remoteRead More →
How to know if your account was hacked and what user information the hackers got After the massive data theft that compromised the information of tens of millions of accounts, Facebook beganRead More →