The term, or in this case the word “blackhat” in tech generally refers to a criminal hacker. The opposite of black is white and a “whitehat” is a security professional. These terms originate from the “spaghetti western” movies when the

You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game. Ethical hackers are called “white hat hackers” and are legal hackers, that

For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe. The malware, which looks just like the Siemens control gear software, has affected at least seven plants in the US. According to

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail. How a hacker circumvents two-factor authentication: First collects enough information on the victim to pull off the scam,

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers. But recently, customers of TeamViewer have reported remote takedowns of their computers that resulted in different

Hackers can take over someone's life in a matter of hours. Just ask Patsy Walsh. Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take