Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » hacking

Articles Tagged with ''hacking''

Been Hacked? Let That Be a Lesson to You

Is Hacking Back with WHOIS a Good Idea?

jonathan zhang
Jonathan Zhang
July 19, 2019

Ever heard the term “hack-back”? Hacking back is the process of identifying attacks on a system and their origin.


Read More
hacker

Data Breach Trends In 2019

May 8, 2019

More than 1,900 breaches were reported through March 31, exposing approximately 1.9 billion records, according to the Data Breach QuickView Report. 


Read More
Malware

Hackers are Targeting Piracy Apps to Install Malware and Steal Data

May 2, 2019

Hackers are tapping into a growing consumer trend: the use of illicit devices and apps to access pirated content to spread malware and exploit unsuspecting users, a Digital Citizens Alliance report found.


Read More
Old PC

3 Things to Understand About Legacy Hardware Systems to Protect Your Data

Kayla Matthews
December 7, 2017
Legacy systems – hardware and software – can double the risk of a data breach. More than 8,500 organizations have over 50 percent of their computers running an out-of-date version of an internet browser, doubling their risk of attack.
Read More
Doorway to Cybersecurity

Phishing Is The Biggest Online Threat For Google Accounts

November 14, 2017

A new Google study reveals how accounts get hacked, taken over, or hijacked.


Read More
clown computer

Phishing: The Scary Clown of Cybersecurity

Gary Davis
October 31, 2017
Much like the It (the clown), phishing goes by many names, has become much more adept at preying on the hopes and fears of individuals, and is growing rapidly as criminals learn which techniques are most effective.
Read More

Americans Rate National Security as New Top Security Concern

June 20, 2017

U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically.


Read More

Computer Hack Sets off 156 Emergency Sirens across Dallas

April 9, 2017
A computer hack set off all the emergency sirens in Dallas for about 90 minutes last weekend.
Read More
password1-900px.jpg

Report Analyzes Bad and Good Online Security Habits

March 21, 2017

People who identified themselves in a survey as “tech savvy” were 18 percent more likely to be victims of online identity theft. In addition those who said they had Ph.Ds were more frequently victims than high school graduates


Read More
password1-900px.jpg

Study Reveals Bad Mobile Password Habits

March 6, 2017

A new study has found that people are just as bad witheir mobile passwords as they are with other technology that they own and use.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing