Cyber Security Articles & News

Corporations making a mad dash to fill cybersecurity jobs

Employers and educators are rethinking the way they attract and train potential employees to meet the demands of an increasingly vulnerable online world.

“It’s scary. Our power grid, our cars, our everyday devices — basically everything is online and able to be attacked,” said Georgia Weidman, author of “Penetration Testing: A Hands-On Introduction to Hacking.” Weidman is the founder of two cybersecurity companies, Bulb Security, where she is chief executive, and Shevirah, where she is chief technology officer. Shevirah specializes in security for mobile devices.

Read More >
TUNE IN: Kevin Mitnick is Going Down!

Kevin Mitnick and I are passionately debating the right password policy, using our decades of knowledge and real-life hacking experience.

Listen to it all go down. Register at https://event.on24.com/wcc/r/1856107/295DE6CAB72FFD67B1323DDF19759750?partnerref=SpiceRG2

Ever since the National Institute of Standards and Technology (https://www.nist.gov) submitted Special Publication 800-63 (https://pages.nist.gov/800-63-3/), Digital Identity Guidelines, for review a few years ago, the computer security world has been debating or intentionally ignoring its newest recommended password policies which run starkly contrarian to decades of previous advice. The new advice is so contrary to decades of previous advice, from the same organization, that virtually no one believes it. Certainly, almost no one is using it.

Read More »
SEE LIVE: The Security Industry Association (SIA) is gearing up for ISC East 2018,

The Security Industry Association (SIA) is gearing up for ISC East 2018, held Nov. 14-15 at the Javits Center in New York City.

ISC East is co-located with another conference, InfoSecurity North America.

At this conference, Europe’s top information security event brings its brand of industry-leading dialogue to the United States for a two-day immersive security professional experience. Infosecurity North America attendees have access to cutting-edge educational programming, future-looking keynotes and an expo floor showcasing the latest technology and information security solutions.

Read More »
Why cybersecurity experts think we should trust midterm election results

Computer systems around the world are vulnerable to cyberattacks. This includes voting machines, email networks, social media, and critical infrastructure that cities rely on to provide basic services. Yet none of these cyber-threats is as dangerous to the electoral process as the cumulative fear and uncertainty that hacking could change the outcome of elections.

Read More »
Social Engineering - From the Trojan Horse to Firewalls

Social Engineering is, without a doubt, the oldest computer hack. A loose term defining a range of hacks and scams, social engineering has persisted through countless centuries of human history. Simple in premise, difficult to defend against, and constantly evolving, social engineering represents one of the single greatest threats to information security in the history of technology.

It’s easy to forget that even the most secure firewall combined with the latest and greatest security software is still operated by a human being behind the keyboard. That extra-tight security is only as secure as the person operating the machine. This often presents the easiest method of entry into a secure system, as human beings are much easier to trick than machines.

Read More »
We asked Kevin Mitnick for the most realistic film about the hackers

(Ed. Note: Translated using Google)

As a lover of pop culture, I could not resist. During a meeting with Kevin Mitnick at the Business Insider Inside Trends conference, I asked him a question about a video that he thinks shows the hackers in the most likely way. In response, I heard a title that I forgot about. And this is strange, because in many circles it is even considered cult. This movie is "Burglars".

Read More »
SEE LIVE: Infosecurity North America Announces Speakers and Panelists for NYC Expo and Conference

Infosecurity North America Unveils Speaker Roster Featuring 30+ CISOs for Its Event Keynote Program

Infosecurity Group, the global knowledge hub for the information security community, today unveiled its roster of 30+ CISO speakers confirmed for this year’s Infosecurity North America Expo and Conference keynote program. Alongside Kevin Mitnick -- world renowned hacker-turned-consultant -- and once target of the FBI’s Most Wanted list, leading headline keynote presentation duties, speakers will address prevalent themes for CISOs operating across a variety of industry verticals over the course of the event, which will be held on November 14 - 15 at the Jacob Javits Convention Center in New York City.

Read More »
Look after yourself, the hacker is watching!

Do you think that you are safe by entrusting data to Microsoft, Google or Apple? And logging in with two-step verification?

None of this, even there you can hack - claims the most famous hacker Kevin Mitnick.

Read More »
Yikes! Online phishing attacks up 297% over last year

To prevent criminals from opening bank, utility and phone accounts in your name, you need more than a credit freeze. Here's what to do.

It's no question that online shopping has continued to grow over the past few years, making it easy to order anything you like from practically wherever you like.

Read More »
WATCH THIS: How RATs infect computers with malicious software

Kevin Mitnick, founder, Mitnick Security Consulting, discusses how remote access Trojans grab data from computers.

CNET's Dan Patterson interviewed Kevin Mitnick, founder of Mitnick Security Consulting, and Chief Hacking Officer of the security awareness training company KnowBe4, who demonstrates the dangers of RATs (remote access trojans) and how easily it grabs data from computers.

Read More »