Hacking

In this section we cover hacking, threats, and related security issues. Also see enterprise security and viruses.




Deleting data doesn’t necessarily mean that it’s permanently gone. Here are some methods for keeping your private data out of the wrong...

Never Really Gone: How to Protect Deleted Data From Hackers


All hackers are bad people who make a living by stealing your personal information and installing Trojan horses and keyloggers on your...

6 Myths About Hacking That May Surprise You


In the world of enterprise IT, the term “ethical hacker” is quickly gaining ground. On a very basic level, ethical hackers are...

Job Role: Ethical Hacker


Cybercriminals have become quite creative in finding ways to victimize users. There’s now a dizzying array of attack methods that hackers...

How to Find and Remove Camera Malware


Cybersecurity professionals are looking at AI with both enthusiasm and trepidation. It has the potential to add new layers of defense for...

Are Hackers Using AI for Malicious Intentions?


When hacking occurs in a data center, the worst that can happen is a loss of data. When a self-driving car is hacked, what can happen is a...

Hacking Autonomous Vehicles: Is This Why We Don't Have Self-Driving Cars Yet?


Attackers aren’t always looking for an immediate payoff: For the first time ever, a remote access Trojan (RAT), which enables hackers to...

Remote Access Trojan Attacks on the Rise - How You Can Protect Yourself


The internet of things (IoT) is connecting more and more devices every day. While this may mean enhanced convenience for consumers, it also...

Hacking the IoT: Vulnerabilities and Prevention Methods


Thanks to the advance of IoT, the market for wearables keeps expanding to the point that it should hit 50 billion devices by 2020. These...

Hacking Wearable Tech: The Potential Danger of Advancing Wearable Technology


Trading cryptocurrencies may be profitable today, but beware. This sector has attracted a lot of unwanted attention by evildoers who found...

Hacking Cryptocurrencies


Numerous techniques can allow hackers access to your web apps, but what are the biggest risks? According to the Open Web Application...

A Look at the OWASP Top 10 Project: Protecting Your Web Apps


Artificial intelligence and machine learning are helping to fight crime - both digitally and in the real world. See how recent advancements...

How AI Advancements Are Affecting Security, Cybersecurity and Hacking


Could your organization be hacked? Why not hire a hacker to find out? Many are turning to ethical (white hat) hackers to test system...

How Your Organization Can Benefit From Ethical Hacking


Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...

How Cyberattacks Affect Share Holders and Board Members


The exponential explosion in the value of bitcoin and other cryptocurrencies has garnered the attention of investors the world over. It has...

Hacking Activities Increase Along with Cryptocurrency Pricing


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...

The Health Care IT Security Challenge


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...

Will Blockchain Technology Make DDoS Attacks Obsolete?


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...