Hackers are getting bolder and finding more creative ways to break into cars. They’re turning to apps and phishing attacks.
Continue ReadingHacking
Cybersecurity News
Cybersecurity News Cyber Insurance, Media Supply Chain Attack, LinkedIn Security.
Continue ReadingCyber Security Forecast 2023
Cyber Security Forecast 2023 with Sandra Joyce, Mandiant Head of Global Intelligence.
Continue ReadingCybersecurity Company Cyber Attack
Thursday, a company that works with local governments across North Carolina has been paralyzed by a cyber attack with no end in sight.
Continue ReadingThe LastPass Hack
In this video we cover the latest information about the lastpass data breach.
Continue ReadingBattle With Bank Over $249,000 Scam
An elderly couple who lost a quarter of a million dollars in a sophisticated online scam are equally gob smacked by their bank’s inaction to stop the crooks.
Continue ReadingMultipick® Kronos Lock Pick
The extremely popular Multipick Kronos electric lock pick, our clients can just not get enough of this amazing tool.
Continue ReadingAPI Hacking 101
In this webinar, we will cover the basics of API hacking and Security, but instead of being a defender, we’re now attacking.
Continue ReadingWayne County School Cyber Attack
South Redford schools are closed after a cyber attack. The district said that the administration is trying to resolve the attack on the district’s resources.
Continue ReadingStonnington Council Cyber-Attack
Stonnington council has been targeted in a cyber-attack, exposing ratepayers’ private information.
Continue ReadingBrooklyn Hospitals Cyberattack
Demand for help at Brookdale Hospital, one of three hospitals without a computer network following a cyberattack.
Continue ReadingSuffolk County Cyber Attackers
Cyber Attackers who wreaked havoc in Suffolk County’s computer networks allegedly demanded $2.5M in ransom from the county.
Continue ReadingUS Vulnerable to Cyber-Attacks
A rare look inside the U.S. Cyber Command whose mission is to protect the country against foreign cyber-attacks and to use cyber weapons.
Continue Reading



