Home Technology - Hacking

Technology - Hacking

Technology news and blogs

“Cybercrime Uses Social Engineering Techniques to Steal Employee Credentials and Commit Payroll Diversion.”

When Does Effective Persuasion Become Manipulation? There’s a fine but clear line between ethical and unethical persuasion, says Joe Gray, a security consultant from the “Advanced Persistent Security” blog...

28-year-old Romanian Woman Pleads Guilty for Hacking 126 Computers

A Romanian Woman Eveline Cismaru. 28, pled guilty to federal charges for illegally gaining access to more than 126 computers that connected to Surveillance cameras installed and used by Metropolitan...

[Heads-up] Two Interesting Things You Want To Know About Right Away

This is the very first time I am giving you...

Microsoft Office Macros Remain Top Choice for Malware Delivery

Microsoft Office documents containing malicious macros accounted for 45 percent of malware loaders in August 2018, according to a blog post by Cofense. These macros were used to deliver a...

It Only Takes One Phish to Spoil Your IPO

The recent data breach of pre-IPO biotech firm Guardant Health shows how much impact a single successful phishing attack can have on an organization. Healthcare and biotech companies hold some pretty...

Looking at Cyber Attacks From the Inside Out, It’s All About Social Engineering

Frances Zelazny, Vice President of BioCatch, gave a recent Tech Republic interview to share some insight into how hackers can access your passwords. It's familiar but worth reviewing, since the...

Tips on writing term papers

Writing term papers is a great task and is also something are bound and then to run in lots of university...

The Need for Security Champions as Part of Your Security Culture

Security cultures don’t exist within organizations because IT wills them to. With the increase in attacks, organizations need internal advocates for the necessary shift in corporate culture to occur. Just about...

Tips on consulting college essay writing services

College essay writing and application writing cover all the aspects and of college transfer and prep school, graduate school and scholarship and...

Threats posed by using RATs in ICS

While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In...

APLICATIONS

What IT Security Can Learn …

How a framework developed for fighting California wildfires back in the '70s can fortify first responders to a modern cyberattack. The increasingly dynamic...

YouTube

HOT NEWS