The implementation of Voice over Internet Protocol (VoIP) technology is one of the most important changes for public and private organizations around the world, allowing users to establish communications usingRead More →

Belgian cybersecurity specialist Mathy Vanhoef reported the finding of multiple vulnerabilities residing in the WiFi standard that could affect any device sold over the past 24 years. The flaws, dubbedRead More →

When analyzing the most ambitious phishing campaigns, researchers often intuit the deployment of complex techniques and procedures. Nonetheless, the increasing use of the URL forwarding technique for deploying multi-layer phishingRead More →