What You Need to Know About Voice Hacking

As technology advances, more weaknesses and vulnerabilities appear that hackers can use to take advantage of their victims, like phishing, voice hacking and more. Identity theft is one of the most damaging forms of cybercrime, and voice hacking is a subset of that. This kind of attack involves collecting or stealing audio samples that can […]

Read more »

How To Immediately Improve Your Cyber Security

Like the space race and nuclear proliferation a half-century ago, our generation is witnessing an arms race of global proportions. This time around, the battle lines aren’t clearly drawn between warring nations. Instead, this modern arms race is one of network technologies, with cyber criminals cracking and exploiting the security measures we implement to keep […]

Read more »

Are Your Wireless Gadgets Vulnerable to Hacking?

Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system, bring attention to problem areas, and hopefully allow companies to fix the issue in […]

Read more »

What You Need to Know About the Recent FBI Hack

You know things are getting pretty bad when government agencies like the IRS and the Department of Homeland Security have experienced data breaches. Hackers were able to collect and make public the data records of nearly 10,000 Department of Homeland Security employees. Sadly, that’s not the end of it. The same hackers recently published the […]

Read more »

Malicious Code Discovered in the App Store

Apple is often lauded for its advanced and strict security measures when it comes to its computing platforms – including mobile. However, recent events show that no matter how secure a device is, hackers will always find a way. Apple officially confirmed that hackers have used a software development tool to push infected and malicious […]

Read more »