How to jailbreak for iOS 13 – iOS 13.3
One of the most anticipated tools by Apple users and ethical hacking enthusiasts is finally available. After months, the first jailbreak for iOS 13.3 was revealed, also functional for A12Read More →
One of the most anticipated tools by Apple users and ethical hacking enthusiasts is finally available. After months, the first jailbreak for iOS 13.3 was revealed, also functional for A12Read More →
After Donald Trump won the US presidential election in 2016, a cybersecurity investigation started, which determined that the businessman had been favored by the intrusion of Russian government actors. Now,Read More →
Although law enforcement agencies around the world frequently identify new malicious hacking teams, very few of those groups are considered to be real cybersecurity threats. In Kenya, a newly identifiedRead More →
Although manufacturers claim that luxury cars have the best security measures, an ethical hacking researcher intends to prove otherwise by using a device he developed himself. Its creation is capableRead More →
Much of the intelligence work of law enforcement agencies is based on prevention and prospective tasks on criminal activity (especially on cybersecurity issues) although in many cases the strategies implementedRead More →
A web application security researcher reported a cross-site script vulnerability affecting the McDonald’s website (mcdonalds.com) that compromised the information on the website and its users. Before we explain the researcher’sRead More →
During 2019, incidents of medical information exposure were frequently reported due to incorrectly configured databases. This 2020 trend seems to continue, as WizCase cybersecurity researchers have just reported three medicalRead More →
IBM digital forensics team has just released a couple of reports on security vulnerabilities in some of its products. The first report concerns a vulnerability in IBM ServeRAID Manager, versionsRead More →
Network security specialists recently reported the finding of a security vulnerability in fortiAP CLI wireless access points developed by California-based technology firm Fortinet. This flaw can be exploited by someRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com