• Skip to main content

ThingsCyber.com

Cyber Threats

Fingbox: Track all your things cyber and know what WiFi signals are near your house

Fing is a nice app that runs on your smartphone or tablet that will show you who else is on your network. It puts a nice interface on capabilities like Ping, Traceroute and many others and presents information in a way that is fast. You can find links to download the app at Fing.io, and […]

Share this:

  • Twitter
  • Facebook

Filed Under: Cyber Threats, CyberWar, Tech Gear

Re-Engineering Humanity: How Technology Threatens The Future Of Society

Re-Engineering Humanity: How Technology Threatens The Future Of Society by Brett Frischmann and Evan Selinger, provides focused thought into the creeping dangers of the ubiquitous technology we have surrounded ourselves with, focusing on the social technologies that pose the greatest threats to our thinking. Now more than ever we need a dose of quality tech […]

Share this:

  • Twitter
  • Facebook

Filed Under: Artificial Intelligence, Books, Cyber Threats, CyberWar

FBI Warns About Targeting Of Internet of Things Devices

The FBI, via the Internet Crime Complaint Center at www.ic3.gov has information they want you to know about. The government is worried about the threats that bad guys are posing to all of us who use tech, especially Internet of Things (IoT) devices. The bad guys compromised IoT device for many reasons, including for use as ways […]

Share this:

  • Twitter
  • Facebook

Filed Under: Cyber Threats, Protect My Computer

In The Age Of Fake News It Is More Important Than Ever To Know Your Cognitive Biases

Cognitive Biases

Learning the way you think, including information on common cognitive biases, can help your brain to make better, more rapid assessments on new data. This is critically important in the age of overwhelming information we are currently living in. The average citizen is surrounded with information from TV, radio, entertainment, the Internet, social media, co-workers, […]

Share this:

  • Twitter
  • Facebook

Filed Under: Cyber Threats, Video

The Economist Predicts Hackers Will Pose A Greater Threat

Cyber Security

This is a very good overview of the state of attack and defense in the modern world where every cyber thing is connected. This report is short/succinct and easy to watch but makes several very important points that capture how hackers may be impacting our lives, homes and work in the coming year. You might […]

Share this:

  • Twitter
  • Facebook

Filed Under: Cyber Threats, Video Tagged With: Hacking

Learn Most Important Lessons Of Cyber Conflict with A Fierce Domain: Conflict in Cyberspace

cyber conflict

Cyber conflict is hard to conceptualize because cyberspace itself is hard to understand. The best definition is the one that popularized the term. William Gibson of Nueromancer fame, wrote that Cyberspace is: A consensual hallucination experienced daily by billions … Unthinkable complexity. Gibson really nailed it. Cyberspace today is all our interconnected IT. And it is absolutely […]

Share this:

  • Twitter
  • Facebook

Filed Under: Books, Cyber Threats, CyberHistory, CyberWar

How Hackers Really Crack Your Passwords

Have you ever wondered how hackers really get passwords? If your only source of information is the movies you might have the wrong idea (Ha, see  Hacking In The Movies vs Hacking in Real Life). This video provides a clear explanation of how hackers steal and/or crack passwords. The techniques are actually not that complex […]

Share this:

  • Twitter
  • Facebook

Filed Under: Cyber Threats, Video

AI Update: Microsoft Research on Artificial Intelligence and Cyber Security

AI is becoming widespread, especially in the cybersecurity community. This means in the very near future, every company, and every person, will be using AI. We will all need a more secure framework to deal with AI topics and address AI concerns. There are huge security concerns we will all have to address, some of […]

Share this:

  • Twitter
  • Facebook

Filed Under: Artificial Intelligence, Cyber Threats, Tech Landscape, Video Tagged With: Microsoft

Back to the future – Moonlight Maze

Thomas Rid dives deep into the first major APT (advanced persistent threat), the operation known as Moonlight Maze. This presentation comes from the detailed account of this event in his book, The Rise of the Machines, which was published in the summer of 2016. From the book write-up: As lives offline and online merge even […]

Share this:

  • Twitter
  • Facebook

Filed Under: Books, Cyber Threats, CyberHistory, CyberWar, Video Tagged With: APT, Moonlight Maze, Thomas Rid

A Hacker Shows Us How Easy It Is To Gain Unauthorized Access

Hacker Pablos Holman does a quick overview of some hacking capabilities, bringing it home for the audience by showing them how he can access information relevant to their daily lives. He also demonstrated in very humorous ways that he can exploit hotel systems by hacking, including hotel TV services. He even demonstrated how he could […]

Share this:

  • Twitter
  • Facebook

Filed Under: Cyber Threats, Video Tagged With: Pablos Holman

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

| Contact Us | About Things Cyber | Privacy Policy | Terms of Service |