Skip to content
Weekend Roundup19 May: We 3D-Printed Luigi Mangione’s Ghost Gun. It Was Entirely Legal

19 May: We 3D-Printed Luigi Mangione’s Ghost Gun. It Was Entirely Legal

Missed Any of the Weekend’s Big Stories?

Here is a selection of top cyber security stories from the last few days:

  • We 3D-Printed Luigi Mangione’s Ghost Gun. It Was Entirely Legal
    Read more
  • How the Knock-off Signal App Used by Trump Officials Got Hacked in 20 Minutes
    Read more
  • FBI Warns of Ongoing Scam That Uses Deepfake Audio to Impersonate Government Officials
    Read more

Have You Been Breached?

Here are some useful links:

  • New ‘Defendnot’ Tool Tricks Windows Into Disabling Microsoft Defender
    Read more
  • O2 VoLTE: Locating Any Customer with a Phone Call
    Read more
  • Printer Maker Procolored Offered Malware-Laced Drivers for Months
    Read more

About Jetico

Jetico provides complete endpoint data protection software for National Security, Compliance and Personal Privacy. Trusted for over 20 years by the U.S. Department of Defense, Jetico’s BCWipe can wipe selected files beyond forensic recovery, such as in response to classified data spills, while BCWipe Total WipeOut can erase hard drive data entirely, such as for disposal or decommission. To protect stored data, Jetico’s BestCrypt delivers compliant data encryption software for whole disks, virtual drives and selected files or folders. Jetico Enterprise Editions include central management for client software control.

Jetico products are trusted by government and military agencies, all of the top 10 U.S. defense contractors, many national laboratories, as well as various other enterprises and a wide global base of home and small business users in over 100 countries. Founded in 1995, Jetico is privately held and headquartered besides Otaniemi Science Park in the Helsinki Metropolitan Area, Finland. For more information, please visit jetico.com.

Back to all Weekend Roundup

Enhance Your Data Protection Now

Request a free consultation with our data protection specialist to learn how our solutions can help you secure your endpoints.