WATCH ABOVE: Police are asking ethical hackers to help them with their investigation into the Ashley Madison data leaks. Tech reporter Nicole Bogart explains the difference between so-called white hat and black hat hackers. 782 more words
Tags » Ethical Hacking
5 frightening hacking targets which include planes, guns, automobiles, Nuclear power plants and everyday devices
With nearly 5 billion non-communication devices connected to the internet worldwide ranging from watches to CT-scanners to airplanes, providing government, cyber criminals and cyber terrorists can cause confusion and damage in our everyday life. 614 more words
WhatsApp Web client support is now available for iOS users.
That’s right, now iOS users can access their instant messaging facility on the web; without taking the other route (via jailbreaking). 239 more words
The Impact Team – Wait, Cheaters! We haven’t yet done.
The group of hackers behind the breach of Ashley Madison, the popular cheater’s dating service, have released a second, even much bigger ‘cheat sheet’ exposing sensitive materials that include sensitive corporate information. 342 more words
Last July 31, 2015, I gave a talk about Information Security and Ethical basics at PATTS College of Aeronautics in Paranaque City. It was quite challenging because the audience were not familiar with IT concepts. 97 more words