A Sneak Peek at Pokémon Go Application Forensics UPDATED 7/22/16 – Thanks to Warren Raquel (@warquel) a Senior Security Engineer at the National Center …Read More
Red More: TechValidate Source: Red Hat Inc.Read More
Whatever is done on a computer may be there for the life of the computer. Don’t do anything that you might have to explain to someone later - Interview with Richard Bunnell, Co-owner of Digital Forensic Services LLC.
Dear Subscribers, we had a little chat with Richard Bunnell, Co-owner of Digital Forensic Services LLC. We spoke about what is …Read More
Use common sense in security and defence. Don't overdo it - Interview with Arno Reuser, Founder of Open Source Intelligence
Dear Subscribers, today we would like to share with you a new great interview. We spoke with Arno Reuser, Founder …Read More
Account hijacking, or the process by which a hacker or fraudster gains unauthorized and complete access to a player’s account, …Read More
Recently, I was sent an invite from someone who reportedly worked in the health industry as an "Information Security Manager". …Read More