Cyber Security Articles & News

WATCH: Kevin Mitnick explains how hackers use social engineering to steal our data

The most famous world hacker Kevin Mitnick in an interview with BI Poland

during the Inside Trends conference explained how hackers use social engineering.

He also assessed, among others, how much banking systems are actually safe.

To view this video, please go to the source.

Read More >
The most famous hacker in the world will come to Poland to learn about manipulating people

Kevin Mitnick in the world of hacking is what Michael Schumacher is in the world of F1. Already in October, this reformed cybercriminal will come to Warsaw to teach participants of the Business Insider INSIDE TRENDS conference, among others about the protection of their data on the Internet and technologies of psychological manipulation.

Read More »
Beware! Your Smartphone is Watching You

Today’s millennial is born into technology and see it as a requirement and not a luxury. Smartphone has become integral to our existence—our personal secret keeper—safe-keeping significant amount of personal and professional information such as our personal to the moment data and photos, bank details, emails, passwords etc. In the wake of several privacy and information breach incidents, the big question glaring at us all is – “are our secrets really a secret anymore?” One is probably monitored by half a dozen companies from the moment they open their eyes in the morning until they go to sleep; and if you own a sleep tracker, then probably while you sleep too! A seemingly innocuous message could be all that is needed to compromise your privacy – by say, accessing microphone, call logs, locations, bank details and everything that is yours! Here’s how:

Read More »
Beware! Your smartphone could be snooping on you

While smartphones are the epitome of modern convenience, these devices which store our personal and professional information like emails, photos, bank details etc. can easily fall prey to hackers and to other malicious activities. With the recent series of data breaches across businesses globally, the concern regarding protecting user data has become more relevant than before. There are many applications in your smartphones that access your private data by taking permissions through pop-ups or otherwise. You would notice apps like third-party applications, flashlights, etc. asking permissions to access your gallery, messages, calls, which they don’t need. Allowing these third-party applications access to your smartphone's data puts your information at risk. Hardip Singh, Executive Director, Optiemus Infracom, feels that the dirty little secret that these ubiquitous devices, which we have with us 24X7, and keep switched on for most of the time, is also a serious threat to our privacy. An innocent looking message could be all that is needed to compromise on your privacy — accessing your microphone, your call logs, your locations, your bank details and everything that is very personal to you.  Here’s why:

Read More »
BOOK REVIEW: Be prepared (Afrikaans)

The Art of Invisibility

by Kevin Mitnick

Publisher: Little, Brown and Company

USA

A former hacker delivers a gloomy report about our privacy at a time when technology giants suck all information about you. Some simple precautions may be useful.

Read More »
Cybersecurity books arm readers in the war against hackers

The Editors at Cybersecurity Ventures read “The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age” by Adam Segal last year and featured it here. The groundbreaking book about cyberwarfare is as relevant today and when it was published — and recommended summer reading for anyone who hasn’t gotten to it yet.

Read More »
From Reporter to Private Investigator to Security Engineer

How I fell in love with coding and traded in a camera-rigged Prius for a MacBook and a GitHub account.

Read More »
LISTEN: Advice For May Gardening In Kansas City, And The Social Science Of Hacking

After figuring out a teacher's password with a program he created in high school, Kevin Mitnick knew hacking was his calling. But there's more to hacking than simply understanding computers, says Mitnick. It's about understanding people.

Read More »
Taser Building Surveillance Like Robocop

Transcript

TTWCP-DAILY-44_2017-03-02_Taser-Building-Surveillance-Cameras-Like-Robocop

Read More »