Security News

A new social engineering toolkit has been discovered. The operational premise has been used many times, but the execution of that premise is new and described by security researchers "a beautiful...

Hacking Smart Homes - the Stuff of Horror Movies read more

Social Engineered, dedicated to the “Art of Human Hacking,” was gutted, with 55,121 users' details leaked on the same day as the hack.



Attackers are constantly changing tactics, so ensuring that you are armed against the latest threats is critical.

Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.

BioCatch's VP Frances Zelazny explains each step of social engineering hacks, low-tech cyberattacks that have a big impact on business.

Former Fraudster Brett Johnson on the Latest Cybercrime TrendsAlthough fraud schemes continue to evolve, social engineering remains a critical element, says Brett Johnson, a former fraudster who...
