How British queen uses her anti hacking secure encrypted phone?
An expert on issues related to the British crown claims to have discovered who are the two people with whom Queen Elizabeth II talks the most through her smartphone, inRead More →
An expert on issues related to the British crown claims to have discovered who are the two people with whom Queen Elizabeth II talks the most through her smartphone, inRead More →
A security report claims that Ukrainian police managed to dismantle a dangerous mobile hacking group that mainly targeted Apple and Samsung users. In total, the Security Service of Ukraine arrestedRead More →
In a security report, VMware notified its customers of the fix of some server-side request forgery (SSRF) and arbitrary file reading vulnerabilities in vCenter Server. According to the report, theRead More →
The British parliament has approved a new provision that will ban the use of universal default passwords for Internet of Things (IoT) devices, which is expected to mitigate the riskRead More →
Specialists from the security firm Claroty reported the detection of multiple code execution vulnerabilities in various virtual private network (VPN) products dependent on OpenVPN. In total, 4 flaws were detectedRead More →
The Indonesian government is investigating a hacking group that claims to have stolen the personal records of thousands of police officers, this as part of a series of cybersecurity incidentsRead More →
A few days ago, police in the Indian state of Madhya Pradesh arrested two individuals in possession of 20 kilos of marijuana ready for sale. Apparently, these people had aRead More →
After an investigation by the non-governmental organization Brennan Center for Justice, it was discovered that a couple of years ago the Los Angeles Police Department (LAPD) hired the services ofRead More →
Information security experts report that StripChat, one of the largest webcam platforms for adults, was the target of a cybersecurity incident that led to a data breach, affecting millions ofRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com