Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these…
A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI…
Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18…
A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at…
NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to…
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group.…
The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social…
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight…
FBI and security researchers have uncovered fraudulent activity pertaining to relief efforts associated with the tragic Nepal earthquake. Cyber criminals…
Italian police with the support of the Europol and the FBI arrested 10 members of a criminal gang that targeted…
This website uses cookies.