

Hacking a Tesla
This is another demonstration of how people can hack into cars. However, just because it is possible does not mean it is practical. Look...


Hacking and Applied Hacking to Biology
Hack into hotel network though Hotel TVs. You can also watch what other guest are watching in their rooms. Hacking wireless auto keys to...


AI in Hacking
Eric Ilmberger CNT 52 Network+ I went looking for news on mass AI attacks but was unable to really find anything. As AI develops further...


12 DEC 2017 Security Update
In this issue will will cover recent news topics in cyber security. #Security #Antimalware #Malware #Hacker #Hacking #Cybercrime...


Scamming a Scammer
One of my students decides to take a call from a scammer. What follows is the conversation and remote connection the scammer takes to...


Hacking Cars, Plans, and Devices
How safe are we? If planes can be hacked and cars can be hacked, what is preventing terrorists or contract killers from hacking vehicles...


Cyber-espionage Technology Ups the Game
Espionage is nothing new, with the advent of technology why wouldn’t spies take full advantage of the benefits and ease of use technology...


Hacking the iPhone's Face ID
A Vietnamese security firm says it has been able to fool the iPhone X's facial recognition software. In a video released by the company...

Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial...


The Wolf
Stop what you are doing and watch this. It's a big ad for HP but you gotta take a minute to view it. Especially after what we were...