Cyber Security Articles & News

SEE LIVE: Cyber Incursion – Protecting Your Assets

Kevin Mitnick is perhaps best known as the hacker who made it onto the FBI’s Most Wanted List for breaking into the computer systems of multiple government agencies and over 40 major corporations. Mitnick was a fugitive for four years, and after getting caught was put on trial and sentenced to five years in a federal prison, including a year in solitary confinement.

Read More >
NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

Read More »
Corporations making a mad dash to fill cybersecurity jobs

Employers and educators are rethinking the way they attract and train potential employees to meet the demands of an increasingly vulnerable online world.

“It’s scary. Our power grid, our cars, our everyday devices — basically everything is online and able to be attacked,” said Georgia Weidman, author of “Penetration Testing: A Hands-On Introduction to Hacking.” Weidman is the founder of two cybersecurity companies, Bulb Security, where she is chief executive, and Shevirah, where she is chief technology officer. Shevirah specializes in security for mobile devices.

Read More »
Social Engineering - From the Trojan Horse to Firewalls

Social Engineering is, without a doubt, the oldest computer hack. A loose term defining a range of hacks and scams, social engineering has persisted through countless centuries of human history. Simple in premise, difficult to defend against, and constantly evolving, social engineering represents one of the single greatest threats to information security in the history of technology.

It’s easy to forget that even the most secure firewall combined with the latest and greatest security software is still operated by a human being behind the keyboard. That extra-tight security is only as secure as the person operating the machine. This often presents the easiest method of entry into a secure system, as human beings are much easier to trick than machines.

Read More »
EVENT REVIEW: Cyber Security Atlanta Day 1 Highlights

Must see video: Day 1 of Cyber Security Atlanta 2018

Where: Georgia World Congress Center, Atlanta Georgia

When: 15-18 October 2018

Read More »
Dark web data points to a digital blitzkrieg against banks

Financial institutions (FIs) are among the biggest spenders when it comes to cyber security

-the financial sector has the second highest investment in security in the UK.

 However, there is a key area of continued weakness for FIs, and that is advanced email attacks that bypass traditional cyber security technologies and target employees and customers.

Read More »
SEE LIVE (Poland) “I will show how hackers use our weakness”

Among his "favorite actions" he mentions, among others hacking communication lines of McDonald's restaurants. When customers came through the so-called DriveThru, employees could hear them and receive applications, but it was Kevin Mitnick who responded, blocking this possibility of service. "I sat in front of the window and took over communication" - recalls years later the most famous hacker in the world, who will be the guest of the October Inside Trends conference in Warsaw.

Read More »
SEE LIVE (NYC): Infosecurity North America

Infosecurity North America Comes to New York’s Jacob Javits Convention Center for a Two-Day Event on November 14-15

Infosecurity Group, producers of Europe’s no.1 information security event, today announced the launch of its second annual Infosecurity North America Expo and Conference. The event will be held November 14-15 at the Jacob Javits Convention Center in New York City, with world renowned hacker-turned-consultant -- and once target of the FBI’s Most Wanted list -- Kevin Mitnick, headlining the event’s keynote. Infosecurity North America will also bring together other leading members of the cybersecurity community to lead the critical debate around trends at the forefront of the industry.

Read More »
EVENT REVIEW: Channelnomics Recognizes Xerox Security Summit as Top Security Event of 2018

Regardless of their size or industry, one thing every business has in common is a reliance on the Web to execute their fundamental business processes. Everything from communicating with clients to banking, ordering, invoicing and more, happens online. That means that every customer you serve is susceptible to cybersecurity breaches, making cybersecurity both a chief concern for your customers and a significant challenge.

Read More »
Social Engineering Schemes Target Humans, Not Technology

In the world of cybersecurity, it’s a well-known secret that the weakest links in every cyber defense strategy are humans, not technology. Many times, it’s simpler to blame technology, and then to look to technology to solve the problem. 

Read More »