<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/hacking/the-secret-history-of-hacking/"></div>The Secret History of Hacking This video shows how hacking came to be and the logic and what hacking really is. Hacking is not only
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/hacking/can-hacking-be-ethical/"></div>Can Hacking Be Ethical? Is it ethical for computer security expert to infiltrate into other company or person’s websites or accounts? Yes if it is
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/indonesia-slams-reported-australian-spying-mind-boggling/"></div>Jakarta (AFP) – Indonesia slams reported Australian spying as mind boggling. Indonesia Monday described as “mind-boggling” a report that Australian spies targeted Jakarta during a
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/over-100-indian-website-hacked/"></div>Over 100 Indian Website Hacked By Pakistani Hackers. According to thehackersmedia, the most of Pakistani Hacktivists group joined forces to attack on Indian Cyber Space and to
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/south-korea-credit-card-firms-punished-data-theft/"></div>South Korea credit card firms punished over data theft. The regulators have punished three credit card companies for their role in the country’s largest ever
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/cyber-security-news/google-acquired-password-sounds-startup-slicklogin/"></div>Google acquired password sounds startup SlickLogin, an Israeli security company that uses smartphones and high-frequency sounds for identity verification on Web sites. SlickLogin is startup with three-person
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/google-apple-app-store-removing-games-flappy-word-title/"></div>Google and Apple app Store removing all Games with “Flappy” word in the title. Security researchers from multiple anti-malware firms have recently identified a number of
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/cyber-security-policy/"></div>Security Polices have become a hazardous evil in today’s computerized world. Without a Cyber Security Policy, one becomes quite an open target for numerous attacks.
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/cyber-attack/"></div>Cyber Security is a fashionable and fast-moving field; the attacks that are catching the headlines can change significantly from one year to the next. Regardless
<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/european-cyber-crime-center-report/"></div>What are the main future cyber crime threats on the horizon? And how has the European Cyber crime Center (EC3) contributed to protect European citizens