Who Are Cybercriminals? The 10 Most Infamous Cybercriminals
Throughout human history, crime has been ever-present. Whether it’s burglary, theft, fraud, extortion, vandalism, or more serious offenses, it always followed us. But as technology progresses, criminals find more ways to conduct their illegal activities.
Top 9 Internet Search Engines Used by Security Researchers
We all know what internet search engines are, and why they’re used. Even when you want to search for the most mundane thing ever, you can go to Google, Bing, Safari, or any of the other traditional web browsers. But what if you need access to information not usually found on those popular search engines?
Top 10 Hacker Movies of all Time
Hollywood has a knack for influencing public opinion on many different topics. It’s been doing just that for over a century, and hackers have been no exception.
Social Engineering: What Is It? Types of Social Engineering Attacks and How to Protect Yourself from Them
With human error being the top cause of data breaches¹ in all kinds of organizations, it isn’t surprising that a type of cyber attack that exploits human psychology would be one of the most common threats to enterprise security we see.
Top 10 Cybersecurity Legends You Should Know About
Cybersecurity is growing quickly and it might seem difficult to keep up with all the latest developments and trends. But there are some trends—or better yet, people—who have left their unmistakable imprint on the history of cybersecurity.
Hacker vs Cracker: Main Differences Explained
Media coverage of data breaches is increasing rapidly, especially with the public’s watchful eye on organizations and the vulnerable systems they work with — easy targets for exploitation. However, the less-than-dramatic truth is that the frequency and scale of data breaches hasn’t really soared* in the past decade, even if people are still at great risk of having their data exposed. The media itself has brought on the hype and created a fear culture around data breaches and malicious attackers.
Exploring Google Hacking Techniques - Top Google Dorks
Some time ago we wrote an interesting post about the OSINT concept and its importance in the security researching world, showing how easy it is to get information from publicly available sources on the Internet. Last week one of our developers shared an interesting link he found — one that was exposing many supposedly “private” resources from different websites.
Top 10 Common Network Security Threats Explained
The old childhood warning “Stranger danger!” has withstood the test of time even in our modern, developed world. Now that most of our daily procedures and activities are automatized and available for use on the Internet, we need to take the same level of precaution we did as children, crossing to the other side of the street whenever we saw a suspicious stranger. This precaution is needed even more after seeing some critical statistics surface, claiming that nearly one-third of the world’s computers are infected with some type of malware.
Is WordPress Secure?
WordPress is one of the most high-profile open source CMS's in use today. Being that 60% of all CMS websites use Wordpress, and 31% of all websites on the Internet use it, it's safe to say that it's a frequent target of security exploits.
Top 15 Ethical Hacking Tools Used by Infosec Professionals
Automated tools now rule the Internet; you can find a few to make your social networks grow, others to answer emails automatically, and even bots to help your online customers. Of course, hacking has evolved too: nowadays you can find a lot of automated OSINT Tools that can help anyone with security research and intel reconnaissance in a way that just wasn’t possible twenty years ago.