The extremely popular Multipick Kronos electric lock pick, our clients can just not get enough of this amazing tool.
Continue ReadingPhysical
10 Secret Service Tactics
The secret service is responsible for protecting the president and other high level government officials. Their tactics and methods are amazing!
Continue ReadingWar Between China and Taiwan
Tensions over Taiwan are the highest they’ve been in nearly three decades could it lead to all-out war?
Continue ReadingInside a Google Data Center
A tour inside a Google data center, and details about the security, sustainability and the core architecture of Google’s infrastructure.
Continue ReadingMicrosoft Has Underwater Data Centers
Microsoft has just reached the end of a two-year stage two experiment, sinking our data to the ocean floor, and here’s why this is big news.
Continue ReadingASD Releases Coin With Secret Code
Australian Signals Directorate releases coin with secret code to mark cyber-spy agency’s 75th anniversary.
Continue ReadingWhat is an Ethical Hacker?
We chat to ethical hacker Zoe Rose to find out how vulnerable we really are online.
Continue ReadingIntroducing The New USB Rubber Ducky
From movies and TV to the hearts and toolkits of cybersecurity pros the world over, the USB Rubber Ducky is a hacker culture icon synonymous with the attack it invented.
Continue ReadingHacking a Samsung for $6 Million
With the promise of up to $6 million worth of Bitcoin locked on this Samsung Galaxy phone, it was a challenge Kingpin couldn’t refuse.
Continue ReadingGoogle Data Center Security
Security is one of the most critical elements of our data centers’ DNA. With dozens of data centers globally, security operations means managing a massively complex network. Follow Stephanie Wong, as she journeys to the core of a data center, to show you the six layers of physical security designed to thwart unauthorized access. She’ll meet experts along the way to explore the inner workings of the technology and systems that make Google Cloud one of the most robust enterprise risk management platforms.
Continue ReadingIndustrial Control Systems ICS-CERT Alerts
Industrial Control Systems ICS-CERT Alerts
Continue ReadingMcAfee Advanced Threat Research Delta EnteliBUS Manager Vulnerability Demo
The McAfee Advanced Threat Research team discovered a zero-day vulnerability in the Delta Controls enteliBUS Manager
Continue ReadingMcAfee Advanced Threat Research Demo McLear NFC Ring
This video demonstrates advanced threat research and how an attacker could clone a NFC Ring used to interact with NFC enabled door locks, and potentially gain access to a consumer home.
Continue Reading