Hacking

In this section we cover hacking, threats, and related security issues. Also see enterprise security and viruses.




Numerous techniques can allow hackers access to your web apps, but what are the biggest risks? According to the Open Web Application...

A Look at the OWASP Top 10 Project: Protecting Your Web Apps


Spam may be little more than annoying email. Then again, it might just steal your identity or drain your bank account.

Email Spam: What Goes Around Comes Around?


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...

The Cyber War Against Terrorism


Phone hacking is a widespread problem that is expected to grow with the increasing prevalence of smartphones. Fortunately, there are many...

Could Your Smartphone Be Hacked?


As recently as five years ago, hurricanes would have kept us in our homes. But times have changed. Find out why writer John McMullen sought...

Hurricane Sandy: Why I Spent It at Barnes and Noble


Social engineering might be low tech, but it works. That means that protecting against it isn't so much about technology as it is about...

Stopping Social Engineering: Who's Looking Over Your Shoulder?


Hackers have a bad reputation, but these tech renegades actually do serve a purpose.

5 Reasons You Should Be Thankful For Hackers


IT professionals use best practices to keep corporate, government and other organizations' systems safe.

The 7 Basic Principles of IT Security


As Twitter becomes an increasingly important source of information, hackers are turning it into a playground. Check out some of the biggest...

Top 4 Most Devastating Twitter Feed Hacks


These threats come from attackers with substantial means, backing and motivation to inflict major damage.

Advanced Persistent Threats: First Salvo in the Coming Cyberwar?


Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...

How Cyberattacks Affect Share Holders and Board Members


Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.

Whaling: Phishers Look to Land a Big Catch


Whether it is cyber criminals utilizing ransomware or hackers performing data breaches for extortion, the healthcare industry is now the...

The Growing Cybersecurity War on the Health Care Industry


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.

Border Gateway Protocol: The Biggest Network Vulnerability Of All?


Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...

Why Android Anti-Malware Apps Are a Good Idea


Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options.

How Should Businesses Respond to a Ransomware Attack?


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...

Common Methods Hackers Are Using To Crack Your Cellular Phone


Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...

Is This a Potential Cure for Malicious Android Apps?


This Trojan Horse keystroke logger is believed to be a special FBI surveillance program that can be installed remotely via an email...