Cyber Security Articles & News

BOOK REVIEW: The Art of Invisibility by Kevin Mitnick

I was fortunate enough to meet the author, Kevin Mitnick, while attending RSA in February. I was given a signed copy of The Art of Invisibility, one of The State Security’s must-reads for infosec pros, so I made it a point to read the book.

Read More >
EVENT REVIEW: This Hacker Can Talk His Way inside a Data Center

When a credit bureau hired Kevin Mitnick’s company to test its security defenses, he went straight for the crown jewels. He decided he would try to get inside the bureau’s data center, physically, on his own two feet.

Read More »
WATCH: Hacker Explains The Easy Way To Hide Online

BROWSE THE INTERNET ANONYMOUSLY

Read More »
Who Has Your Data?

Hackers are getting bolder. Here’s how to fight back

Read More »
BOOK REVIEW: Kirkus Reviews: The Art of Invisibility

KIRKUS REVIEW

Read More »
Top 4 White Hat Hackers Everyone Should Know

Top 4 White Hat Hackers Everyone Should Know

Read More »
BEST BOOK OF THE MONTH!!! Amazon Books: The Art of Invisibility: The World’s Most Famous Hacker Teaches you How to be Safe in the Age of Big Brother

Announcement on Kevin's twitter here.

Read More »
WATCH: ABC Four Corners – Cyber War (2016)

Cyber War: How hackers are threatening everything from your bank account to the nation’s secrets.

Read More »
Digital Life - Lo and behold

THERE is a room in one of the science buildings in UCLA that is ground zero for the birthplace of the internet. In the 2016 documentary by legendary filmmaker Werner Herzog, Lo and Behold, Reveries of the Connected World, we get to see that room—complete with a commemorative plaque about the fateful day in Oct. 29, 1969, when the first message was transmitted over a network from one computer in UCLA to another at the Stanford Research Institute 400 miles to the north.

Read More »
Australia’s Ty Miller and the world’s most famous hacker, Kevin Mitnick to push cyber black hat thinking further

The session will tackle the approaches and issues facing many Australian security managers and organisations grappling with a changing security environment, requiring non-traditional responses in a world still catering for traditional security methodologies.

Read More »