Hacking

In this section we cover hacking, threats, and related security issues. Also see enterprise security and viruses.




Artificial intelligence and machine learning are helping to fight crime - both digitally and in the real world. See how recent advancements...

How AI Advancements Are Affecting Security, Cybersecurity and Hacking


Could your organization be hacked? Why not hire a hacker to find out? Many are turning to ethical (white hat) hackers to test system...

How Your Organization Can Benefit From Ethical Hacking


Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...

How Cyberattacks Affect Share Holders and Board Members


The exponential explosion in the value of bitcoin and other cryptocurrencies has garnered the attention of investors the world over. It has...

Hacking Activities Increase Along with Cryptocurrency Pricing


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...

The Health Care IT Security Challenge


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...

Will Blockchain Technology Make DDoS Attacks Obsolete?


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...

Cybercrime 2018: The Enterprise Strikes Back


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...

How Retailers Can Safeguard Against Holiday Hackers


Phone hacking is a widespread problem that is expected to grow with the increasing prevalence of smartphones. Fortunately, there are many...

Could Your Smartphone Be Hacked?


Social engineering might be low tech, but it works. That means that protecting against it isn't so much about technology as it is about...

Stopping Social Engineering: Who's Looking Over Your Shoulder?


As technology continues to play an ever larger role in our lives, these threats can leave users feeling exposed.

The 5 Scariest Threats In Tech


Deleting data doesn't necessarily mean that it's permanently gone. Here are some methods for keeping your private data out of the wrong...

Never Really Gone: How to Protect Deleted Data From Hackers


On Facebook, not everything is as it seems. No matter how many friends you have, enemies may be lurking there as well.

6 Sneaky Ways Hackers Can Get Your Facebook Password


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...

Common Methods Hackers Are Using To Crack Your Cellular Phone


Hackers have a bad reputation, but these tech renegades actually do serve a purpose.

5 Reasons You Should Be Thankful For Hackers


IT professionals use best practices to keep corporate, government and other organizations' systems safe.

The 7 Basic Principles of IT Security


Discover how pools of investment money, research and development and the creation of vast distribution channels is speeding up the...

The Ability to Combat Ransomware Just Got a Lot Tougher


With a staggering 65,535 TCP ports being made available on a single IP address it's easy to see why there are so many security exploits on...