Cyber Security Articles & News

BOOK REVIEW: Hacker knows best: Privacy tips from Kevin Mitnick

This security expert knows all the tricks for stealing your personal information. His new book tells you how to keep your data safe.

Read More >
SEE LIVE: Learn and Network at Data Center World Global 2017

Data center and IT professionals from around the world are gearing up for Data Center World Global 2017 conference, April 3-6 in Los Angeles.

Read More »
NEW BOOK: The Art of Invisibility, Hachette Book Group

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
by Kevin Mitnick

Read More »
Machines, Networks And People: Addressing Evolving Cyber Threats

OVERVIEW

In 2015, an accountant looking at the balance sheets of a US tech company noticed, to their dismay, a $39 million hole in their figures. They would have been even more dismayed to know where it had gone – a member of the financial team in an overseas subsidiary had transferred it directly to the thief. All the thief had to do was pretend they were a CEO.

Read More »
BOOK REVIEW: Kevin Mitinick: The Art of Invisibility

A highly useful handbook for how not to be seen—online, anyway.

Read More »
The Changing Role of the White Hat Hacker

The word “hacker” existed long before it entered the public consciousness as a reason to practice good cybersecurity habits. It goes back to the 1960s, where computer culture was developing at MIT. The Jargon File, a glossary for computer programmers established in 1975, has eight definitions for hacker (or nine, if you include the hat tip to the original meaning of the term as “someone who makes furniture with an axe”).

Read More »
Top 4 White Hat Hackers Everyone Should Know

Top 4 White Hat Hackers Everyone Should Know

Read More »
KnowBe4 Introduces New “Social Engineering Indicators” Training Method

KnowBe4 introduces a new training method that IT managers can use to better manage continually increasing social engineering threats

Read More »
FBI agent explores how social engineering attacks get a boost from social media

Cybercriminals use social networking outlets to tailor their social engineering attacks, increasing their chance of success. A solution is in the works to mitigate the effects of these threats.

Read More »
WATCH: Computer Hacker Shares How to Keep Personal Information Safe

A man who was known as a thief to the FBI and a ghost to many corporations visited the city of Laredo to give some advice about cyber hacking.

Read More »