9 Results for:PHREAK

  • Sort by: 

Renowned hacker and social engineer Kevin Mitnick dead at 59

By Alex Scroxton 20 Jul 2023

Famed hacker and social engineer Kevin Mitnick, who was at one time one of the most wanted cyber criminals in the world, has died peacefully at the age of 59 from complications arising from pancreatic cancer, ... Read More

Phreaks love Bluetooth

By Mark Baard 01 Dec 2004

Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless. Read More

Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz

28 Mar 2004

Read Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade. Read More

How does the iPhone phishing scam work?

By Nick Lewis 18 Feb 2019

An iPhone phishing scam leads users to believe malicious incoming calls are from Apple Support. How can enterprises protect their employee against this threat? Read More

How social engineering attacks have embraced online personas

By Nick Lewis 14 Nov 2017

Discover the extent to which attackers will go to plan social engineering attacks. Nick Lewis explains how the progression of threats is changing how we monitor social media. Read More

A history of hacking and hackers

By Danny Moules 25 Oct 2017

A security professional’s view on criminal hacking has shifted away from the traditional stereotype of the hacker, towards a much more diverse cross-section of wider society Read More

IT/OT convergence is hard work -- here's why it's worth it

By Stan Gibson 12 Mar 2020

On the way to Industry 4.0, IT and operations technology are coming together. Here's what companies are learning about the benefits and risks of IT/OT convergence. Read More

The security lingo of 2004

By Bill Brenner 08 Dec 2004

This was the year of botnets, zombie PC armies and phishying online schemes. Read More

Targeted Cyber Attacks

16 Dec 2014

In this excerpt of Targeted Cyber Attacks, authors Aditya Sood and Richard Enbody outline the cyberattack model and different vectors used to attack targets. Read More