Tag "Hackers"

Back to homepage
Software

How hackers exploit critical infrastructure

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as

Industry Insights

Hack like a CISO

Developing the security officers’ processes, strategies and techniques for managing their time, resources and teams.I have written several times over the last couple of years about how the role of

Hardware/Network

How hackers exploit critical infrastructure

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as

Software

Cryptocurrency Mining Malware Hits Over 1 Million Computers in China

By Julia Sowells Senior Information Security Specialist at Hacker Combat, Over one million computers in China have been infected by cryptocurrency mining malware resulting in hackers earning over $2 million in

Software

Taken by Ransomware? Certain Skills Required

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Identity Theft

The Most Common Hack Is Also the Most Successful. Here’s How to Fight It

Despite what movies might show, most hacks don’t involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren’t

Industry Insights

Hacker-powered security is reaching critical mass

HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 million in bounties awarded to hackers from

Industry Insights

An overview of the OT/ICS landscape for cyber professionals

Most cyber security professionals take for granted the information technology or IT nature of their work. That is, when designing cyber protections for some target infrastructure, it is generally presumed

Industry Insights

Hacker-powered security is reaching critical mass

HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 million in bounties awarded to hackers from

Software

Winning back data control with smart web security

Despite the growing danger, some businesses are unable to shake of the shackles of their legacy security solution, perhaps fearing a complex onboarding process with a new solution. The web