Various methods used to hack and steal keyless cars
These are the most common ways a cybercriminal can compromise a connected car Opening a car without needing to use a key may seem very convenient, but experts in digitalRead More →
These are the most common ways a cybercriminal can compromise a connected car Opening a car without needing to use a key may seem very convenient, but experts in digitalRead More →
The former Equifax employee used confidential information to make profits In August 2017, a project under the codename “Sparta” was granted to Sudhakar Reddy Bonthu, a production development manager whoRead More →
The manufacturer has solved two of the five reported errors; three patches are in the process of being released Telepresence robots manufactured by the company Vecna Technologies can be hackedRead More →
In a coordinated announcement, Microsoft, Google, Apple and Mozilla have declared that they will remove the TLS 1.0 and TLS 1.1 protocols in 2020 According to experts in digital forensics, TransportRead More →
Information of some accounts may have been compromised Tumblr has just published a security advice admitting the presence of a security vulnerability on its website that could have allowed hackersRead More →
The Department of Defense is testing new methods for recruiting young professionals in technological areas Like many federal agencies, the Department of Defense (DoD) is struggling to attract, recruit andRead More →
Researchers from the Silesian University of Technology in Poland discovered several flaws that could be exploited to take control over some models of D-Link routers A group of digital forensics investigators fromRead More →
Five Australian men have been linked with the authorship of this videogame cheat code Take-Two Interactive and Rockstar games have always closely followed the tracks behind the cheat code developersRead More →
Further details about the incident are still unknown A persistent error on PlayStation 4, Sony‘s most prestigious game console to date, could exploit and collapse the console via a text message.Read More →
The tool allowed access to the victims’ computers without their consent A 21-year-old man living in Kentucky, who had previously plead himself guilty of developing, marketing and selling a popular RemoteRead More →
The United Kingdom’s National Cybersecurity Centre has thwarted more than 1.6k attacks over the past two years, many of them deployed by other governments The UK cyber defense center hasRead More →
Users inadvertently fall into fraudulent or unreliable sites Experts in digital forensics report the emergence of a search engine optimization (SEO) pollution campaign directed against the keywords associated withRead More →
The company is eliminating the restrictions it imposed on Android device manufacturers, after a plea with the European Union Google is in the process of eliminating a ban on smartRead More →
The social network reports that it will not provide protection against identity fraud to victims of the recent attack that compromised their information Last Friday Facebook revealed that highly confidential information ofRead More →
No measure has been taken to solve this flaw We all prefer to think that the voting systems in our countries are efficient and that the votes counting are alwaysRead More →
With a few weeks left to the midterm elections, voter information from 19 states has appeared on the dark web Up to 35 million voter registrations from 19 AmericanRead More →
Speed limit and other road signs could be spying on drivers Have you ever heard of digital license plates? Digital forensics experts have commented on the drawbacks to these smartRead More →
The bug can be exploited to access the photos stored on a user’s device, and it’s been found in iOS12 A digital forensics specialist has discovered a vulnerability in AppleRead More →
Cryptocurrency mining attacks on Apple devices have increased almost 400% in the last month During the last two weeks of September cryptojacking attacks against iPhone and others devices using theRead More →
The US Department of Defense has begun to notify victims of this incident involving military and civilian personnel The US Department of Defense has revealed that a security breach hasRead More →