The CISA cyber security bill passes US Senate despite tech giants, privacy advocates, and civil liberties groups express their disappointment.…
FBI has published the lists of most wanted hackers, the rewards for their capture reach $4.2 million. They have stolen…
Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these…
A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI…
Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18…
A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at…
NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to…
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group.…
The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social…
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight…
This website uses cookies.