Cyber Security Articles & News

Social Engineering - From the Trojan Horse to Firewalls

Social Engineering is, without a doubt, the oldest computer hack. A loose term defining a range of hacks and scams, social engineering has persisted through countless centuries of human history. Simple in premise, difficult to defend against, and constantly evolving, social engineering represents one of the single greatest threats to information security in the history of technology.

It’s easy to forget that even the most secure firewall combined with the latest and greatest security software is still operated by a human being behind the keyboard. That extra-tight security is only as secure as the person operating the machine. This often presents the easiest method of entry into a secure system, as human beings are much easier to trick than machines.

Read More >
Facebook hack: What to do if you were one of the 50 million people who had their information exposed

Sheryl Sandberg, Mark Zuckerberg and me. And there's a good chance you, too.

Read More »
WATCH THIS: Former hacker weighs in on Facebook’s big security breach

Kevin Mitnick, computer security consultant and hacker, discussed recent reports that Facebook experienced a security breach that impacted about 50 million profiles.

To view this video and other interesting videos, refer to the source.

Read More »
SEE LIVE (NYC): Infosecurity North America

Infosecurity North America Comes to New York’s Jacob Javits Convention Center for a Two-Day Event on November 14-15

Infosecurity Group, producers of Europe’s no.1 information security event, today announced the launch of its second annual Infosecurity North America Expo and Conference. The event will be held November 14-15 at the Jacob Javits Convention Center in New York City, with world renowned hacker-turned-consultant -- and once target of the FBI’s Most Wanted list -- Kevin Mitnick, headlining the event’s keynote. Infosecurity North America will also bring together other leading members of the cybersecurity community to lead the critical debate around trends at the forefront of the industry.

Read More »
Kevin Mitnick, CEO, Mitnick Security

Preceded by reputation

Kevin Mitnick is perhaps best known as the hacker who made it to the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.

Read More »
Cybersecurity Is Not An Option

Cyber attacks are a growing global challenge, as hackers have become smarter, and more sophisticated. So how then can Philippine enterprises prepare themselves for cyber-threats before they even happen?

Read More »
Beware! Your smartphone could be snooping on you

While smartphones are the epitome of modern convenience, these devices which store our personal and professional information like emails, photos, bank details etc. can easily fall prey to hackers and to other malicious activities. With the recent series of data breaches across businesses globally, the concern regarding protecting user data has become more relevant than before. There are many applications in your smartphones that access your private data by taking permissions through pop-ups or otherwise. You would notice apps like third-party applications, flashlights, etc. asking permissions to access your gallery, messages, calls, which they don’t need. Allowing these third-party applications access to your smartphone's data puts your information at risk. Hardip Singh, Executive Director, Optiemus Infracom, feels that the dirty little secret that these ubiquitous devices, which we have with us 24X7, and keep switched on for most of the time, is also a serious threat to our privacy. An innocent looking message could be all that is needed to compromise on your privacy — accessing your microphone, your call logs, your locations, your bank details and everything that is very personal to you.  Here’s why:

Read More »
SEE LIVE: The Biggest Names in Cybersecurity Reveal All at Security Titans (Phoenix)

On Friday, February 23, the Security Titans conference will come to the Scottsdale Center for the Performing Arts. Two of the world's most famed hackers, along with the biggest names in information security, will discuss cybersecurity, social engineering, and threat detection at this exclusive one-day event.

Read More »
INTERVIEW: Kevin Mitnick, a legal hacker, warns of ‘the new normal’

Hacker-turned-security-consultant Kevin Mitnick used an arsenal of everyday items - laptops, a Bluetooth speaker and Wi-Fi - to demonstrate the ease with which one bad actor can wreak havoc on a business or consumer.

Read More »
KnowBe4 Releases Email Exposure Check Pro to Help Organizations Identify At-Risk Users

KnowBe4, provider of the most popular security awareness training and simulated-phishing platform, today announced the release of the new version of its Email Exposure Check (EEC). The new version is called the EEC Pro, has powerful additional features and is still provided at no cost.

Read More »