This week on Lock and Code, we talk to Doug Levin, founder of the K12 cybersecurity resource center , about how schools can plan for a cybersecure 2021.
We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.
We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.
We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.
A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
This Safer Internet Day, we’re presenting a guideline to employees on how to navigate the online trenches safely, whether they’re on their desktop computers, company-owned laptops, or mobile devices. Who wants to be the one responsible for a breach? No one.
We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds.