Never use Alexa and Amazon Echo if you value your privacy
We may sometimes forget it, but it is always necessary to remember that smart speakers like Alexa and Amazon Echo are nothing more than a microphone connected to the Internet,Read More →
We may sometimes forget it, but it is always necessary to remember that smart speakers like Alexa and Amazon Echo are nothing more than a microphone connected to the Internet,Read More →
According to cyber forensics course specialists, a U.S. judge granted permission to a police agency to force some users to put their fingers in the fingerprint reader of some iPhoneRead More →
Cyber forensics course specialists report the presence of adware in at least 50 Android applications available on the official Google Play Store platform. In some cases, adware is capable ofRead More →
Cyber forensics course specialists reported that Wall Street Market, a drugs selling site in dark web, has been closed suddenly, becoming the second website of its kind that closes duringRead More →
The technology giant Microsoft plans to eliminate the so-called password expiration policy, by which the company requests Windows users to change their login keys periodically, reported vulnerability testing specialists. TheRead More →
A new Oracle WebLogic server zero-day vulnerability is being exploited in the wild, reported vulnerability testing specialists. The company has already been notified of the flaw, although the corrections areRead More →
Cyber forensics course specialists reported the finding of security vulnerability in several chips developed by the company Qualcomm; According to the specialists, these flaws could be the entry point forRead More →
A ransomware attack has been detected in the systems of Aebi Sschmidt, one of the largest manufacturing companies in Europe and that has presence in the United States, reported cyberRead More →
The U.S. government’s online crime report states that, during the year 2018, the FBI Internet Crime Complaints Center (IC3) received about 352k allegations related to multiple illicit online activities. AccordingRead More →
One of the most constant threats faced by website, web applications, and online infrastructure operators are the so called denial-of-service (DoS) attacks. According to cyber forensics course specialists, threat actorsRead More →