Security check in Facebook
How to know if your account was hacked and what user information the hackers got After the massive data theft that compromised the information of tens of millions of accounts, Facebook beganRead More →
How to know if your account was hacked and what user information the hackers got After the massive data theft that compromised the information of tens of millions of accounts, Facebook beganRead More →
The Department of Defense is testing new methods for recruiting young professionals in technological areas Like many federal agencies, the Department of Defense (DoD) is struggling to attract, recruit andRead More →
Speed limit and other road signs could be spying on drivers Have you ever heard of digital license plates? Digital forensics experts have commented on the drawbacks to these smartRead More →
What would happen if your smartphone could be hacked through the videocall service in WhatsApp? This might sound like fiction, but the digital forensics expert Natalie Silvanovich found a critical vulnerability inRead More →
Google will close its social networks as part of a review of the information it shares with third parties Google announced its decision to shut down Google+, designed to competeRead More →
For most people it is difficult to determine what is “normal” when looking for signs that reveal a compromised host. This is easily one of the biggest problems that digitalRead More →
The bad news continues for Facebook, as just hours after the social network reported on the attack they suffered, compromising the information of about 50 million users, a lawsuit was announcedRead More →
At least three online wallet apps were removed from the store without prior notification Google banned at least three of the top online cryptocurrency wallets from Play Store over theRead More →
Researchers demonstrated how easy it is to manipulate and access this footage In recent years, police agencies have more adopted body chambers for their elements, promoting them as an effort to increaseRead More →
Enterprise network security experts explain that spoofing occurs when someone makes a call and deliberately modifies the information shown to the person who receives the call, thus hiding his/her identity.Read More →