Cyber Security Articles & News

Learn the safest way to surf the Internet without fear of hackers

(Translated from Malay using Google Translator)

Read More >
WATCH: A hacker explains the best way to browse the internet anonymously

While it may seem difficult these days to remain anonymous online, it's not impossible. We spoke with Kevin Mitnick, author of "The Art of Invisibility," who told us the one tool you should be using if you want to protect your identity. 

Read More »
WATCH: It Only Takes Hackers 60 Seconds to Steal Your Identity - Here’s How you Can Prevent It

Did you know that it only takes 60 seconds for hackers to do a quick internet search and steal your social security number, date of birth and your mother’s maiden name? Pretty scary, huh? 

Read More »
Kevin Mitnick gives tips to be on the internet “invisible”

Whomever wants to be "invisible" on the Internet would be wise to encrypt emails and use the Tor network, so advises the famous former hacker and security expert Kevin Mitnick . He was once the most wanted hacker in the world and was eventually sentenced to a prison term of five years for breaking into several large companies.

Read More »
BOOK REVIEW: Trust No One: Privacy 101 from “The Art of Invisibility”

"That's some catch, that Catch-22."

Read More »
BOOK REVIEW: The Art of Invisibility

I recently had the opportunity to read an early version of the Art of Invisibility by Kevin Mitnick and wanted to share some of my thoughts on the book and what it may mean to you.  First off, while there are some anecdotal stories, this is no novel.  This is mostly a book about what is happening in today’s data driven world and connected gadgets.  The book shares what you can do to stay obscured in the times when everything you do is cataloged and stored.

Read More »
BOOK REVIEW: Hacker knows best: Privacy tips from Kevin Mitnick

This security expert knows all the tricks for stealing your personal information. His new book tells you how to keep your data safe.

Read More »
Machines, Networks And People: Addressing Evolving Cyber Threats

OVERVIEW

In 2015, an accountant looking at the balance sheets of a US tech company noticed, to their dismay, a $39 million hole in their figures. They would have been even more dismayed to know where it had gone – a member of the financial team in an overseas subsidiary had transferred it directly to the thief. All the thief had to do was pretend they were a CEO.

Read More »
The immensities of the Internet in “Lo and Behold”

In her tour, Herzog interviews Internet pioneers like Bob Kahn and Ted Nelson, astronomers who explain the global hecatomb that could cause a solar storm.

Read More »
An Unexpected Journey With Werner Herzog ‘Lo and Behold’ celebrates the digital connection that defines us

In the rainforest. Wearing a bandana and a loincloth, and wielding a chainsaw instead of a machete, he knew exactly what to do." Werner paused and took a sip of wine. "The Peruvian native tied the bandana around his thigh, pulled the knot tight, pulled the throttle on the chainsaw and cut off his leg above the knee." Looking with earnest concern, I manage to utter, "Really?" Werner smiles, "He lived."

Read More »