Technological Advantages: Los Angeles Private Investigators Are Some of the Best in the Nation
A lot of people still don’t have that much idea about private investigating. Except if they have needed the services of a private investigator before or just intrigued by theirRead More →
Two court-hired pentesters accused of intrusion; what would have happened if they hadn’t had permission to perform the tests?
Ethical hacking experts report the arrest of two security specialists hired to evaluate a US court’s IT infrastructure; according to the reports, the two experts were caught while trying toRead More →
Have you ever walked near the White House? Your phone may have been spied on using a Stingray
For months there has been speculation about a set of cell towers placed in various points of Washington, DC Now, digital forensics specialists say they are sophisticated spying devices, presumablyRead More →
Stop Facial Recognition in concerts | See private Instagram photos
Ticketmaster is creating a facial recognition database of concert goers; be careful | Share private photos from your friends’ Instagram profile with anyone who doesn’t have access to it BelowRead More →
Good news for privacy; France is set to block Libra, Facebook’s own cryptocurrency
Governments around the world still don’t rely on the use of virtual assets. Cybersecurity specialists report that France has informed about its intention to block the development of Libra, Facebook’sRead More →
An iOS flaw allows anyone to see your contacts without unlocking your iPhone
One of the most anticipated launchings by Apple users is iOS 13, the new version of their operating system; however, although it has not yet arrived for the general public,Read More →
SMS critical vulnerability to hack any mobile
Security researcher of AdaptiveMobile Security have discovered a critical vulnerability that can allow hacker to take control of your mobile phone with just a SMS. This is how it work:Read More →
What is voice SQL injection and how Alexa was hacked with it?
Each web application has different security measures to ensure data protection and user access control. However, experts mention that most users do not have knowledge of web application security andRead More →
Once again Connecticut, New York and Florida schools are infected with ransomware
The recent wave of ransomware attacks on school districts in various U.S. states does not stop and has claimed new casualties. Digital forensics specialists reported an incident at some schoolsRead More →













