WATCH: Hackers and state authorities you can follow through a camera cell phone
How easy it is to hack into a cell phone and secretly turn on a camera
Read More >How easy it is to hack into a cell phone and secretly turn on a camera
Read More >You may have been a little panicked on hearing that the CIA could get back into your smartphone. But there are solutions. If it's impossible to completely protect your phone, there are still some tricks for you to fight hacks.
Read More »KnowBe4, provider of the most popular integrated platform for security awareness training and simulated phishing, announced it has climbed up the Cybersecurity 500 to claim a top spot at #38) on the definitive list of the world’s hottest and most innovative companies in the cybersecurity industry.
Read More »Did you know that it only takes 60 seconds for hackers to do a quick internet search and steal your social security number, date of birth and your mother’s maiden name? Pretty scary, huh?
Read More »Most people know that computers can have malware, but did you know your cell phone is also vulnerable? Kevin Mitnick, notorious hacker and author of the book "The Art of Invisibility," explains two easy ways that someone might hack into your phone. Whether it's a jealous spouse, the CIA, or a nation state, here's how they might do it and how you can protect yourself.
Read More »WikiLeaks published a large cache of documents stolen from the CIA related to hacking tools on Tuesday. The Wall Street Journal has confirmed their authenticity with an intelligence source.
The files seem explosive at first glance. Internal CIA files are rarely seen, and WikiLeaks has used them to claim that the agency has "lost control of the majority of its hacking arsenal."
Trump continues to use his old Android phone to Tweet, according to a report in The New York Times, but this could pose a security risk. Kevin Mitnick, one of the country's most notorious hackers and author of the book "The Art of Invisibility," explains why.
Read More »When it’s big enough, an event itself can be Big Data. Bring together over 40,000 attendees and over 1,200 leading vendors and the topics presented and discussed serve to spell out the current trends in Healthcare Information.
Read More »The Healthcare Information and Management Systems Society (HIMSS) Conference is reliably the most significant health care IT conference in the United States each year, bringing together thousands of vendors and tens of thousands of health care IT professionals focused on a common goal: Improving health care efficiency through technology. This year was no different.
Read More »The 2017 RSA Conference showcased almost 500 security companies proposing elegant solutions to solve a plethora of problems across different domains of security, including web application security, network attacks, data forensics, malware and APTs, encryption key management, risk and crisis management, and biometrics.
Read More »© Copyright 2004 - 2024 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy