Hackers: How they Get In, How They Got In

May 23, 2014

Hacking is more relevant than ever, with the recent events with the Playstation 3 and other such hacks. This infographic goes into the details of just how hackers are able to do what they do best. Source

how-hackers-break-computer

How Hackers Break into a Computer

May 15, 2014

This infographic provides information for how hackers break into computers. It shows how hackers see computers and how they break computer codes. It also provides a glossary of terms used in the computer technology world.

hotel-credit-card-hacking

Hotel Credit Card Hacking

February 12, 2014

Hotels are one of the top dangers facing credit card users this summer. Studies show that 38 percent of all credit card hacking involves hotels, outnumbering the incidents of credit card fraud that happens in other environments, including restaurants, bars, retail stores and the financial sector. Source

who-goes-hackathons

Who Goes to Hackathons?

January 28, 2014

Sweb Development believes in the concept behind Hackathons, where people come together to create something or solve an issue using their diverse skills. Here are some statistics compiled on Hackathons from the past and why they are important. Source

cyber-security-what-makes-strong-password

Cyber Security: What Makes a Strong Password

January 9, 2014

The frustration of a forgotten password can be too much to bear. Why not go with “charles15” or “mhypassword”? Well, because cybercrim is so prevalent. If you want your bank account to still have money in th emorning, you better strengthen your password. Find out what makes a secure password, different techniques to create them, […]

rise-hacktivist

Rise of the Hacktivist

December 19, 2013

An infographic timeline of the rise of Anonymous, Lulzsec and other interesting hacktivist developments in 2011. Source

Twacked: When Good Twitter Accounts Go Bad

Twacked: When Good Twitter Accounts Go Bad

October 21, 2013

When good Twitter accounts go bad. Whether it’s malicious intent or simple human error, Twitter users are increasingly at risk when it comes to protecting their privacy and reputation online. This infographic details several of the most recent and now infamous Twitter hacks, and examines common entry points for hackers, including weak passwords and malicious […]

A Short Histoy of Hacking

A Short Histoy of Hacking

April 10, 2013

Hacking has been around as long as computers as a way to reconfigure or reprogram a system to give access to someone who otherwise shouldn’t have that access. Source

Inside Hackerspaces

Inside Hackerspaces

March 6, 2013

This infographic provides the technical information for how hackers work and how hacking is done. Source

how-hackers-steal-your-data

How Hackers Steal Your Data

February 24, 2013

Dashboard infographic for a Raconteur report on Secure Business featuring in The Times newspaper (UK). This visualisation shows the different avenues hackers take when trying to steal data from businesses. Source

history-hacking

History of Hacking

February 17, 2013

Hacking has been around as long as computers as a way to reconfigure or reprogram a system to give access to someone who otherwise shouldn’t have that access. Source

history-cyber-warfare

The History of Cyber Warfare

February 16, 2013

From governments to major corporations, cyber attacks are growing rapidly in scope and frequency across the globe. These attacks may soon be considered an “act of war” so having the latest information security training is becoming increasingly important. To be prepared for the future, you must also learn from the past. Source