Alyssa Miller: Charting the Course Through InfoSec and Aviation

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Meet Hackie-AI, The New Kid on the Block.

Meet Hackie-AI, The New Kid on the Block.

Meet Hackie-AI, The New Kid on the Block.2 min read·Just now--Seeing global hackers on Interpol, FBI, and Scotland Yard’s top ten list may soon become a thing of the past. Replacing the ...
Is that how it works? Hacking and scamming in popular TV shows

Is that how it works? Hacking and scamming in popular TV shows

| | hacker
We like a good hacker story—and like the screens we watch them on, these stories come in wide array of shapes and sizes.   ...
cryptojacking cryptocurrency, fraudulent, banking, AI is Securing Crypto Exchanges

NY Courts: Who is Liable When Cryptocurrency is Stolen?

One of the great things about the blockchain and cryptocurrency is the fact that it operates outside the commercial banking system. Unfortunately, this means that when cryptocurrency is stolen (or, more accurately, ...
Security Boulevard
ransomware RagnarLocker takedown

Attacker ID’ed After Infecting Own Computer With Malware

A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
Security Boulevard

The Legacy of The Hacker Manifesto

I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
Smart Phone, Smart Watch, Smart Pay, Smart?

Smart Phone, Smart Watch, Smart Pay, Smart?

Smart Phone, Smart Watch, Smart Pay, Smart?How safe is smart?The idea of never needing to carry cash or debit cards looks pretty appealing, right? Never worry about someone trying to steal your ...