article thumbnail

Abagnale Kicks Off 'Vision 2023' Future-Looking Webcast

SecureWorld News

Frank Abagnale, one of the world's most respected authorities on forgery, embezzlement, secure documents, cybercrime, and scams—and subject of the 2002 movie Catch Me If You Can — kicked off Vision 2023: Looking Ahead at Cyber Threats , a half-day educational event held live and recorded on December 13th.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

To put this in perspective, it took a group of 300,000 people and four years of work to crack a 64-bit key in 2002. Meeting industry security standards, mandated or not, will help you with the technical side of cybersecurity, but implementing zero-trust authentication protocols can help to reduce risks associated with human error.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Origins and History of the Dark Web

Identity IQ

2002 – 2006: Origins of the Tor Project After onion routing was patented, additional computer scientists joined the original development team in 2002 and created the biggest project for onion routing yet: The Onion Routing Project, now commonly known as the Tor Project. Turn on multifactor authentication for all online accounts.

article thumbnail

Proposed law seeks to boost federal cyber workforce through apprenticeships, training

SC Magazine

and John Cornyn, R-Texas, submitted a proposed bipartisan legislation, the Federal Cybersecurity Workforce Expansion Act , which would add new section into the Homeland Security Act of 2002 in order to establish workforce programs based on recommendations from the Cyberspace Solarium Commission. Maggie Hassan, D-N.H.,

article thumbnail

ChatGPT: Cybersecurity friend or foe?

Malwarebytes

From the first Roomba in 2002 to the first virtual assistant (Siri) in 2011, AI has slowly and steadily penetrated the consumer technology market, often with little comprehension from buyers that artificial intelligence is actually powering the functionality behind their favorite devices.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1970-1995 — Kevin Mitnick — Beginning in 1970, Kevin Mitnick penetrates some of the most highly-guarded networks in the world, including Nokia and Motorola, using elaborate social engineering schemes, tricking insiders into handing over codes and passwords, and using the codes to access internal computer systems.