Skip to main content
Report this ad

The Latest

  • Identity Theft
    Identity Theft: Should you subscribe to an ID protection service?
    Tax season had barely begun when we got the newsthat hackers had broken into Intuit’s online TurboTax service and stolen customer refunds. Others used the service to create fake returns and collected refunds this way. Originally up to 18...
  • Hackers for Hire both Good and Bad
    Hackers for Hire both Good and Bad
    Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s...
  • Password Security vulnerable to Trickery
    Password Security vulnerable to Trickery
    There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?Well, suppose...
  • The White Hat Hacker
    The White Hat Hacker
    These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year.While a lot of information, including...
  • Lenovo notebook hacked
    What to do if your Lenovo notebook is hacked & Identity theft help
    In September 2014, Lenovo installed Superfish software on certain notebooks. Unfortunately this software has shown to have vulnerabilities that make it easier for hackers to access your personal information. If you have a newly purchased Lenovo...
  • An example of a Snapshot dongle plugged in
    Progressive Insurance snapshot dongle is hackable and can weaponize cars
    Jalopnik reported earlier yesterday (Jan. 20, 2015) that an independent security researcher has confirmed the security vulnerabilities (or lack thereof) that lie within the OBDII dongle that Progressive Insurance provides more than 2 million...
  • Blackhat starring Chris Hemsworth
    'Blackhat' review: Typical Michael Mann, and that's the problem
    Michael Mann has lost it. The director, who has been defined for his specialized visuals and insular storytelling in films from Thief to Heat to Collateral, has lost his cinematic appeal. His last picture, Public Enemies, was a mixed bag of a...
  • Hacker's List gives everyone the opportunity to hire a hacker
    Hacker's List gives everyone the opportunity to hire a hacker
    When it comes to hackers, the world’s attention is largely captivated by large hacks for sensitive information, like the one against Sony, or ones orchestrated for fun or to create chaos. But while all that has been doing on, a small...
  • What is Ransomware?
    What is Ransomware?
    Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly a notice flashes on your screen saying your computer has been compromised and in order to get your files back, you need to pay up some money. This...
  • Russian Hackers getting rich from your Identity
    Russian Hackers getting rich from your Identity
    Where’s the $$$ at? Selling credit card data. Have you heard of the Russian hacking ring that raked in two and a half billion dollars? Check it out:Phishing attacks are lucrative for these cybercriminals.ATM hacks continue to increase, in...
  • Visual Hacking is High Tech Shoulder Surfing
    Visual Hacking is High Tech Shoulder Surfing
    A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over your shoulder while you’re using your computer or mobile (“shoulder surfing” or ...
  • Russian website is live streaming webcams of unsuspecting victims worldwide
    Russian website is live streaming webcams of unsuspecting victims worldwide
    On November 20, 2014 The United Kingdom government, through the Information Commissioner's Office (ICO), issued a shocking warning: live footage streaming from your webcam may be currently shown on a Russian website, which features video...
  • 10 tips to Secure Passwords
    10 tips to Secure Passwords
    Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remember and sentimental to use, this approach...
  • MH370 passengers disappeared on Boeing 777 by sophisticated hacker
    MH370 passengers disappeared by high-tech hacker
    The suspect who disappeared Malaysia Airlines flight MH370 and its 239 passengers and crew is a technical genius with highly sophisticated hacking skills, according to an expert's analysis released Tuesday that exonerates the Boeing 777's...
  • Cyber fugitive John Gordon Baden arrested by the FBI
    Cyber fugitive John Gordon Baden arrested by the FBI
    On November 4, 2014, FBI announced the arrest of John Gordon Baden, 38, who was considered one of San Diego, California’s FBI Most Wanted Cyber Fugitives. Baden was arrested on November 1, 2014, in Tijuana, Mexico, by officers from the...
Report this ad