Adobe Becomes “The Man”?

May 31, 2014

In 2010 the security software company McAfee predicted that Adobe would be a bigger target for hackers than Microsoft. This prediction came true. So why do hackers target Adobe? This infographic looks at Adobe and how they can get off the hackers’ target list. Source


How Hackers Break into a Computer

May 15, 2014

This infographic provides information for how hackers break into computers. It shows how hackers see computers and how they break computer codes. It also provides a glossary of terms used in the computer technology world.


Cyber Security: What Makes a Strong Password

January 9, 2014

The frustration of a forgotten password can be too much to bear. Why not go with “charles15” or “mhypassword”? Well, because cybercrim is so prevalent. If you want your bank account to still have money in th emorning, you better strengthen your password. Find out what makes a secure password, different techniques to create them, […]

Twacked: When Good Twitter Accounts Go Bad

Twacked: When Good Twitter Accounts Go Bad

October 21, 2013

When good Twitter accounts go bad. Whether it’s malicious intent or simple human error, Twitter users are increasingly at risk when it comes to protecting their privacy and reputation online. This infographic details several of the most recent and now infamous Twitter hacks, and examines common entry points for hackers, including weak passwords and malicious […]

Securing Yourself from a World of Hackers

Securing Yourself from a World of Hackers

April 9, 2013

This infographic provides information for how hackers can hack your information using your password. it also provides tips for how to choose a password that is less likely to get hacked. Source

Inside Hackerspaces

Inside Hackerspaces

March 6, 2013

This infographic provides the technical information for how hackers work and how hacking is done. Source


History of Hacking

February 17, 2013

Hacking has been around as long as computers as a way to reconfigure or reprogram a system to give access to someone who otherwise shouldn’t have that access. Source


The History of Cyber Warfare

February 16, 2013

From governments to major corporations, cyber attacks are growing rapidly in scope and frequency across the globe. These attacks may soon be considered an “act of war” so having the latest information security training is becoming increasingly important. To be prepared for the future, you must also learn from the past. Source


The Cyber Thieves That Stole Christmas

January 28, 2013

With the shopping “holidays” of Black Friday and Cyber Monday right around the corner, the National Retail Federation predicts that up to 152 million people will be hitting stores looking for deals. Source


Black Friday and Cyber Monday: Hacks and Scams

January 20, 2013

The holiday season signals the time of year when consumers are often at the highest risk of falling victim to hackers and scammers whose schemes can fool even the most experienced online shoppers. This infographic advises web merchants and consumers on how to avoid Black Friday and Cyber Monday attacks. Source

The Sony Hack

The Sony Hack

December 3, 2012

This infographic provides a timeline to show the series of events that led to how hackers hacked into Sony and potentially stole 77 million users credit card information. It also lists the people responsible for the hacking and how this fiasco compares to past data breaches. Source

IT Seucirty and Breaches

IT Seucirty and Breaches

November 12, 2012

Recently there has been a lot of news surrounding lulzsec and anonymous. We explore some of the consequences of security breaches and what companies are doing for IT security. Source