Skip to main content
Report this ad

The Latest

  • Stephen Witt
    Author Stephen Witt explores dawn of mp3, digital music, and internet piracy
    What happens when an entire generation repeatedly engages in intellectual crime?If you’re talking about copyright infringement, it might very well spell the death of the music business. Or at least the end of the record industry.In the...
  • 3 Ways Criminals influence to steal
    3 Ways Criminals influence to steal
    Criminals use six basic principles of Influence to steal. In this post we will discuss the first 3. The ability to influence boils down to science. By applying some science, anyone can learn to be more influential. It’s easy to influence...
  • Healthcare identity theft is the new credit card fraud
    Healthcare identity theft is the new credit card fraud
    Most people will be familiar with the recent spate of high profile security violations involving the theft of consumer credit card information, such as the highly publicized Target Data Breach in late 2013-- when hackers broke into Target’s...
  • Cybercrime and security online
    Can ethical hacking safeguard your business from cybercrime?
    Pretty much any business today needs a good website to stay competitive. But when you're running a business that operates even partly online, you're going to face plenty of risks that you have to be aware of be proactive about. One of the...
  • What is a Remote Administration Tool (RAT)?
    What is a Remote Administration Tool (RAT)?
    Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.A RAT or remote administration tool, is software that gives a person full control a tech device, remotely....
  • Chaos Computer Club, Europe's biggest association of computer hackers
    Nation's first security college creates student opportunities
    State and national need for security professionals creates new opportunities for the college-bound and now higher education is offering a direct pathway. The nation's first College of Emergency Preparedness, Homeland Security and Cybersecurity...
  • Background Checks aren't as easy as you'd think
    Background Checks aren't as easy as you'd think
    With seemingly more and more people being harassed, stalked and getting their identities stolen, the rate of background check requests (e.g., a small business owner hiring a private investigator) has increased quite a bit.The background check is...
  • Internet Insecurity In Wake of Attacks and Counter Attacks Called Cyber Vandalism
    North Korea internet instability persists despite FBI fingering sony insider
    North Korea’s internet drama continued on Saturday as Internet and 3G phone networks halted for most users, according to Reuters. Reports from China were made via phone land lines, as they could not access networks to report in to their...
  • VP Biden in South Korea
    Sony's mistake was making a bad movie
    The world always has great tensions, and the relationship between the free world and North Korea is as bad as ever. That includes the relationship between Japan and North Korea and the U.S. and North Korea.“Sony Corporation, commonly...
  • What’s Your Click IQ?
    What’s Your Click IQ?
    The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your data compromised. But celebrities are not the only ones getting hacked. Cybercriminals aren’t choosy—they’ll...
  • Blackhat1
    Chris Hemsworth Fights Cybercrime in Trailer for Michael Mann's 'Blackhat'
    Michael Mann's cyber-thriller Blackhat has been one of the more secretive projects the director has undertaken. Perhaps he's just getting into the espionage spirit of the story, which deals largely with matters of information security in...
  • Russian Organized Crime: Krem D'la Krem of Hackers
    Russian Organized Crime: Krem D'la Krem of Hackers
    The Russians have definitely come…in the world of cybercrime. A Russian ring of hackers has amassed 1.2 billion stolen passwords and usernames involving 400,000 websites. The criminals have also garnered 542 million e-mail addresses.And...
  • Passwords stolen: Russian hackers stole 1.2b passwords, at-risk sites unknown
    Passwords stolen: Russian hackers stole 1.2b passwords, at-risk sites unknown
    Passwords stolen by Russian hackers number over one billion, making this latest cybercrime one of the largest data hauls to date. Over 400,000 Internet sites were targeted, and the massive assemblage of user names and passwords has put millions at...
  • DA: International cybercrime ring targeted 1K StubHub users, stole $1.6M
    DA: International cybercrime ring targeted 1K StubHub users, stole $1.6M
    A New York man and two others from New Jersey are among six people who have been indicted for their alleged involvement in an international cybercrime ring that targeted more than 1,000 StubHub users to fraudulently buy tickets and then resell...
  • What is an Advanced Persistent Threat?
    What is an Advanced Persistent Threat?
    If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an advanced persistent threat (APT).This term usually refers to an attack carried out by a...
Report this ad