The top-10 mistakes made when configuring enterprise IT systems
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
79 articles
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Vulnerabilities found in the Exynos chipset allow Samsung, Vivo and Google smartphones to be remotely hacked if the owner’s phone number is known. How is this possible, and how to protect yourself?
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
This week, Dave and Jeff talk about Zoom-bombers, Donald Trump hackers, and some Scouts tackling fake news.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
How tools designed to study and protect rare species can turn from gamekeeper to poacher.
This week’s Transatlantic Cable podcast dishes on a hacked plastic surgeon, unsafe dating apps, new forms of 2FA, and more.
There’s a rumor flying around the Internet that up to 40 million iCloud accounts have been compromised. Now, we normally wait for extra information and corroborating data to back up
Starting on June 10, many people will be tuning into Euro 2016 football championship and trying to consume as much info as they can. Much like many other large sporting
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in
In the morning of April 5, 2016 a number of American radio stations treated their listeners to quite the unusual broadcast. Over the course of 90 minutes, the hosts discussed
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
Experience shows that even Internet old-timers fail to protect themselves from targeted hacking. As our everyday life is becoming more and more connected to the Internet and other networks, online
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that
The morning of November 24, 2014 is engrained into the collective memories of Sony Pictures Entertainment employees. On that day, an unknown cybergang hacked the company’s server, leaked a slew
Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is