Hacking
Your Digital Immortality is Coming, Apple and Google Are Data Gatekeepers, Satellite Security Risks Revealed
In this episode, we explore the implications and ethical dilemmas of immortality in the digital world. Listen to our discussion about this cutting-edge technology and its potential impact on our privacy. Next, ...
Protecting Your Phone from the Looming Threat of Juice Jacking
Juice jacking is causing alarm among executives, board members, and high net worth individuals, as well as federal authorities, tech pundits, and news outlets alike. This insidious form of cyberattack, known as ...
Endpoint Detection Compared
We compare endpoint security products directly using real, major threats How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a ...
Buying Campaign Contributions as a Hack
The first Republican primary debate has a popularity threshold to determine who gets to appear: 40,000 individual contributors. Now there are a lot of conventional ways a candidate can get that many ...
Healthcare breach affects millions of patients; Malicious apps found on Google Play store
We are now past the halfway point of the year, and if certain trends continue, 2023 could be another record year for a number of different cyber crimes. Blockchain analysis firm Chainalysis ...
Employee Spotlight – Joseph Pike
We spoke to Security Analyst, Joseph Pike For this month’s employee spotlight piece, we spoke to Security Analyst and heavy metal enthusiast, Joseph Pike. How long have you been working at SE ...
Wisconsin Governor Hacks the Veto Process
In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly unique in their specificity—to change ...
Sowing Chaos and Reaping Rewards in Confluence and Jira
IntroductionLet me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look ...
Millions of Louisiana, Oregon residents exposed in breach; Researchers uncover slate of fake malicious websites
As we approach the summer months, it’s important to remember cybercriminals will not be on vacation. Cyber scams are conducted throughout the year, and malicious actors may try to take advantage of ...
How to Break Into a Cybersecurity Career – Phillip Wylie
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique ...