#ISC2Congress: How to Mitigate Evolving Insider Threats

#ISC2Congress: How to Mitigate Evolving Insider Threats The changing nature of insider threats was described by Lisa Forte, founder, Red Goat Cyber Security, during a keynote presentation at this week’s virtual ISC2…

Why is Cybersecurity Failing Against Ransomware?

Hardly a week goes by without another major company falling victim to a ransomware attack. Nate Warfield, CTO at Prevailion, discusses the immense challenges in changing that status quo. Yes,…

Best VPN for torrenting 2021

BitTorrent is a complex topic. As a technology, it’s perfectly legal. But what you do with it could be illegal. Before we dive into the legalities of torrenting, let’s do…

Apple iCloud Hacker Steals Nudes

Apple iCloud Hacker Steals Nudes A 40-year-old man from California has admitted his role in a conspiracy to break into the private digital photo libraries of Apple customers to locate…

A China-aligned espionage group is targeting global telecoms, sweeping up call data dating back years

Written by AJ Vicens Oct 19, 2021 | CYBERSCOOP An advanced network of digital spies with a nexus to Chinese interests has successfully compromised parts of the global telecommunications network,…

iPhone Hackers Win $300K

iPhone Hackers Win $300K A white hat hacking team has won a life-changing amount of money for completing the world's first public remote jailbreak of the iPhone 13 Pro. The…

iPhone 13 Pro, Windows, Chrome, Linux and others pwned at Tianfu Cup

Tianfu Cup is a version of the Pwn2own in which hackers from Kunlun Lab managed to secure first place by hacking iPhone 13 through a vulnerability in the Safari mobile…

Best gaming VPN for 2021

Photo by Branden Skeli on Unsplash Look, let’s be honest with each other. The laws of physics aren’t going to be repealed by any VPN service provider. Bits take a…

Best gaming VPN 2021

Look, let’s be honest with each other. The laws of physics aren’t going to be repealed by any VPN service provider. Bits take a certain amount of time to move…

Does someone else secretly have access to your iPhone or iPad?

The other day I downloaded a new version of the iPhone or iPad security app iVerify, and it offered a new tip for securing your device that I’d not considered…