Cyber Security Articles & News

LISTEN: Infamous Hacker Kevin Mitnick Tells Us How He Created Fake Identities

Once arrested by the FBI, Mitnick tells us how to keep information private online.

Read More >
Is Someone Watching You From The Camera On Your Phone?

Do you ever feel like you’re being watched? Perhaps your phone could be the culprit?

Read More »
WATCH: Hackers and state authorities you can follow through a camera cell phone

How easy it is to hack into a cell phone and secretly turn on a camera

Read More »
Now that you know that hackers and the CIA can access your phone, this is how to protect it

You may have been a little panicked on hearing that the CIA could get back into your smartphone. But there are solutions. If it's impossible to completely protect your phone, there are still some tricks for you to fight hacks.

Read More »
WATCH: Hackers and governments can see you through your phone’s camera — here’s how to protect yourself

Most people know that computers can have malware, but did you know your cell phone is also vulnerable? Kevin Mitnick, notorious hacker and author of the book "The Art of Invisibility," explains two easy ways that someone might hack into your phone. Whether it's a jealous spouse, the CIA, or a nation state, here's how they might do it and how you can protect yourself.

Read More »
Everyone is talking about WikiLeaks’ massive CIA data dump — here’s what’s going on

WikiLeaks published a large cache of documents stolen from the CIA related to hacking tools on Tuesday. The Wall Street Journal has confirmed their authenticity with an intelligence source. 
The files seem explosive at first glance. Internal CIA files are rarely seen, and WikiLeaks has used them to claim that the agency has "lost control of the majority of its hacking arsenal."

Read More »
The Changing Role of the White Hat Hacker

The word “hacker” existed long before it entered the public consciousness as a reason to practice good cybersecurity habits. It goes back to the 1960s, where computer culture was developing at MIT. The Jargon File, a glossary for computer programmers established in 1975, has eight definitions for hacker (or nine, if you include the hat tip to the original meaning of the term as “someone who makes furniture with an axe”).

Read More »
Iniesta, Puyol De la Peña and drive Olyseum, the social network that connects fans with their idols

Footballers Andres Iniesta, Ivan de la Pena and Carles Puyol drive since last September Olyseum, the first social network connecting sports fans with their idols. Olyseum aims to bring the highest international level athletes to their fans through a platform that allows them to find information, access to unpublished content and interact like never before.

Read More »
Mitnick to school Australia on Black Hat mindsets

Kevin Mitnick, arguably the world’s most famous hacker, is coming to Australia as part of a conference tour of the region later this month.

Read More »
The most famous hacker in the world launches Olyseum a Twitter football and sport

It aims to bring as never before to the highest international level athletes to their followers.
The first ambassadors of the platform are the players Andres Iniesta, Ivan de la Pena and Carles Puyol.

Read More »