Good bye marketing! Hello growth hacking

Source: National Cyber Security – Produced By Gregory Evans I am currently reading Ryan Holiday’s book, Growth Hacker Marketing, alongside other growth hacking resources, about 33 of them in total. The reason I am on the growth hacking crash course is because I am no longer interested in doing The…

read more

The Evolution of Hacking

Source: National Cyber Security – Produced By Gregory Evans Nowadays, the word “hacker” carries an overwhelmingly negative connotation, conjuring up images of digital thieves intent on stealing identities and letting disruptive viruses loose into cyberspace. It wasn’t always that way. In fact, computer hackers were originally viewed by society The…

read more

Cybersecurity companies work to curb car hacking

Source: National Cyber Security – Produced By Gregory Evans In today’s world of super-connectivity, we secure personal data with firewalls, anti-virus protection, and encryption. But what about our cars? Autos are increasingly becoming computers on wheels. And as CCTV’s Stephanie Freid reports, they are vulnerable to hacks. Cars could The…

read more

China Medals in Hacking

Source: National Cyber Security – Produced By Gregory Evans Cross the Chinese competitors in Rio, or dare to question their competitive honesty amid allegations of doping — and you’ll become the target. That’s what happened to Australian Olympic swimmer Mack Horton. Horton won the gold medal in the 400-meter The…

read more

Accused of hacking, blocked from hugging

Source: National Cyber Security – Produced By Gregory Evans Majd Oweida’s parents had to wait almost four months before they could visit their son in jail. “I cannot describe what it’s like to see your beloved son behind bars,” said Maha Oweida, Majd’s mother. “I could not hug him or…

read more