Cyber Security Articles & News

WATCH: Hackers and state authorities you can follow through a camera cell phone

How easy it is to hack into a cell phone and secretly turn on a camera

Read More >
Now that you know that hackers and the CIA can access your phone, this is how to protect it

You may have been a little panicked on hearing that the CIA could get back into your smartphone. But there are solutions. If it's impossible to completely protect your phone, there are still some tricks for you to fight hacks.

Read More »
Explosive Growth Rocket’s KnowBe4 Up the Cybersecurity 500

KnowBe4, provider of the most popular integrated platform for security awareness training and simulated phishing, announced it has climbed up the Cybersecurity 500 to claim a top spot at #38) on the definitive list of the world’s hottest and most innovative companies in the cybersecurity industry.

Read More »
WATCH: It Only Takes Hackers 60 Seconds to Steal Your Identity - Here’s How you Can Prevent It

Did you know that it only takes 60 seconds for hackers to do a quick internet search and steal your social security number, date of birth and your mother’s maiden name? Pretty scary, huh? 

Read More »
WATCH: Hackers and governments can see you through your phone’s camera — here’s how to protect yourself

Most people know that computers can have malware, but did you know your cell phone is also vulnerable? Kevin Mitnick, notorious hacker and author of the book "The Art of Invisibility," explains two easy ways that someone might hack into your phone. Whether it's a jealous spouse, the CIA, or a nation state, here's how they might do it and how you can protect yourself.

Read More »
Everyone is talking about WikiLeaks’ massive CIA data dump — here’s what’s going on

WikiLeaks published a large cache of documents stolen from the CIA related to hacking tools on Tuesday. The Wall Street Journal has confirmed their authenticity with an intelligence source. 
The files seem explosive at first glance. Internal CIA files are rarely seen, and WikiLeaks has used them to claim that the agency has "lost control of the majority of its hacking arsenal."

Read More »
WATCH: A hacker explains why Trump using his old Android phone for Twitter could be a huge security threat

Trump continues to use his old Android phone to Tweet, according to a report in The New York Times, but this could pose a security risk. Kevin Mitnick, one of the country's most notorious hackers and author of the book "The Art of Invisibility," explains why. 

Read More »
HIMSS 2017: Big Data, Healthcare IT and the Future of Patient Care

When it’s big enough, an event itself can be Big Data. Bring together over 40,000 attendees and over 1,200 leading vendors and the topics presented and discussed serve to spell out the current trends in Healthcare Information.

Read More »
3 trends driving health care IT in 2017

The Healthcare Information and Management Systems Society (HIMSS) Conference is reliably the most significant health care IT conference in the United States each year, bringing together thousands of vendors and tens of thousands of health care IT professionals focused on a common goal: Improving health care efficiency through technology. This year was no different.

Read More »
RSAC 2017 – a View from the Floor

The 2017 RSA Conference showcased almost 500 security companies proposing elegant solutions to solve a plethora of problems across different domains of security, including web application security, network attacks, data forensics, malware and APTs, encryption key management, risk and crisis management, and biometrics.

Read More »