Attacks

Is Your Smart Device Spying on You?

Who are “they” anyway? This perennial question has been asked for decades—and now that we have reached the 21st century, the question has taken on new meaning. With the advent of Artificial Intelligence (A.I.) and mainstream consumer access, the new question is not if someone is listening, but who is listening and what are they

[ Read More ]

What Happens When GPS Spoofing Takes Down A Power Grid?

When the layperson thinks about GPS, they typically visualize themselves conveniently driving with a nice, clear Google Map displayed on their smartphone to show them precisely where they are at all times. In fact, that’s how the vast majority of consumers directly interact with this type of technology—but like most digital things, there’s a bit more

[ Read More ]

Debit Or Credit? How To Protect Your Money From Unbelievable Scams

With almost weekly revelations about new, big data breaches or malware attacks, it’s easy to get numbed into complacency. Especially when doing otherwise might introduce inconvenience into our daily lives.  But literally, can you, afford to ignore these and similar threats? Global losses due to fraudulent credit card, debit card, and mobile payment transactions reached

[ Read More ]

Real-Time Cyber War: It Fuels Terror But Does It Fulfill A Need?

The ability to watch global cyber attacks as they are about to happen? Sounds too good to be true, right? Nowhere else in the world can you locate a battlefield that is active 24/7 —and yet, if you turn on your PC, it’s possible to watch real-time cyberwar night or day. Right before your eyes,

[ Read More ]

This Is Why The Cyber Kill Chain Is The Best Way To Beat A Hacker

The main question behind all cyberattacks, regardless of their scope and size, is always the same: how did the hacker target and attack the organization? Lockheed Martin, an American aerospace company focusing on defense, security, and technology, has tried to address this ongoing query through the creation of a “Cyber Kill Chain”—an approach that essentially

[ Read More ]

Hacking People: Is The Human Brain The Ultimate Attack Vector?

Human beings are an arrogant species. We consider ourselves to be highly evolved. We think we have superior brains. We feel we are in full control of our beliefs and behaviors. Because the alternative—that we’re not in control, and worse, that we can be manipulated—is frightening. And yet, history is brimming with various examples of

[ Read More ]

A Cyber Attack On 911 Services Is The Most Terrifying Thing Ever

In 1968, the U.S. introduced the emergency number 911 which replaced the traditional dialing numbers for the police, fire, and ambulance. Today, North Carolina alone receives 8 million annual calls to 911, that’s more than 23,000 a day delivered across 188 call centers, and they all rely on the technology of 20 routers to service

[ Read More ]

The Surprising Ways A Cyber Attack Can Literally Kill You

When we hear the word cyberattack, we likely imagine an aggressive targeting of information technology, including the networks and infrastructures where it hides. Our understanding is not wrong, as the definition is similarly emphasized in security-based articles or media reports we encounter.  However, we would be wrong to assume that the effects of a cyberattack

[ Read More ]