Hacking

Cyber Incident Analysis

Cyber Incident Analysis

With the advancement in technology, cybersecurity incidents have increased both in oftenness and sophistication. Practically every second somewhere in the…

Your home wireless network is likely not very secure

Your home wireless network is likely not very secure

Most of us don’t think about hackers spying on our home internet activity and searching through our home computer files.…

Kevin Mitnick – The Most Infamous Hacker of All Time

Kevin Mitnick – The Most Infamous Hacker of All Time

Kevin Mitnick is considered the most famous hacker of all time. We describe his amazing story from small time hacker to fame.

What to do if your WordPress Site Gets Hacked

What to do if your WordPress Site Gets Hacked

Some estimates state that 40% of websites use the Content Management System (CMS) known as WordPress. WordPress is one of…

The Marriott  Hack – This is What will Happen Next.

The Marriott Hack – This is What will Happen Next.

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers.  These hotels include…

Data Limitation Laws?

Data Limitation Laws?

It is usually not a good idea for lawmakers to get involved in cybersecurity beyond a certain point.  The reason…

Passwords Suck and Will Go Away – Here’s How

Passwords Suck and Will Go Away – Here’s How

Why Passwords Suck Usernames and Passwords are not secure by nature.  Usernames and Passwords are controls that rely on “Something…

Are Dark Web Scans Effective?

Are Dark Web Scans Effective?

The Dark Web is Anonymous The dark web is a scary place.  It is a network of websites teeming with…

Why Hardware Encryption is Not Secure

Why Hardware Encryption is Not Secure

Hardware Encryption is not Secure A Little History… In the past, it was assumed that hardware encryption is far more…

Murder by Hacking

Murder by Hacking

Hackers have already - perhaps many times- have contributed to death by hacking into secure systems and releasing information. 

What is Zerodium?

What is Zerodium?

Zerodium is a reputable place where you can sell zero-day exploits. Hackers and security researchers know that Zerodium is a…

What is Persian Stalker?

What is Persian Stalker?

Persian Stalker is targeting Iranian social media accounts. The “group” has been around since 2017, and they have been observed…

Phishing attacks up by 300% in 2018

Phishing attacks up by 300% in 2018

According to “The Retail and eCommerce Threat Landscape Report” from October 2018, there is a 297% increase in the number…