Hacking news, information, and how-to advice

uss john s. mccain
tom pendergast in the alps

dany and dragons

HBO hackers threaten to leak final episode of Game of Thrones Season 7

The attackers responsible for hacking HBO say they are about to leak this year’s final episode of Game of Thrones.

hacker, DDOS, IoT, SkilledAnalysts

Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets

In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets.


I Am Henry the Eighth I Am (Not)

Many of us can be forgiven if the recent HBO hack has us recalling the Sony Pictures incident, singing ‘Second verse, same as the first.’ Pub culture aside, the HBO hack actually has little in common with the Sony incident. But HBO’s...

iot internet of things strategy briefcase

Who can regulate the IoT?

The Internet of Things (IoT) promises to simplify many aspects of life. It will also permeate every aspect of life, which has a lot of experts concerned. To deal with the risks of all those connected IoT devices, we need proper,...

daily stormer

GoDaddy kicks Daily Stormer, which then claimed Anonymous hacked it

Anonymous called BS on Daily Stormer's claim they hacked it, suggesting the hate-spewing site may be having problems finding a new host.

threat spy unsecure hack

Russian hackers used leaked NSA hacking tool to spy on hotel guests

Fancy Bear, a Russian government-sponsored cyber-espionage group, has been accused of using a leaked NSA hacking tool in attacks against hotels in order to spy on guests.

cyberwarfare defense illustration

Drop a pre-emptive cyber bomb on North Korea?

Cyberwarfare experts share opinions on how to deal with the North Korean cyber threat.

eliminate insider threats 1

IT's 9 biggest security threats

As this list of the biggest security threats shows, hacking has evolved from a one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launderers.

fbi primary3

FBI used booby-trapped video to unmask suspected Tor-using sextortionist

The FBI tainted a video with code that revealed the real IP of "Brian Kil," a sextortionist who used Tor to mask his identity while terrorizing girls in Indiana.

quantum computing KryptAll

A quantum of solace

A digital weapon of mass destruction is just over the horizon. If corporate and government leaders were caught off guard during the recent ransomware attacks, this will truly terrify them.

internet gavel keyboard 100354014 orig

WannaCry 'hero' to pay $30,000 for bail, plead not guilty to Kronos trojan charges

Bail was set for $30,000 for Marcus Hutchins, aka MalwareTech, after he was arrested for allegedly creating the banking trojan Kronos.

cyber attack virus meltdown

John McAfee ranks the biggest hacks ever

Tech pioneer John McAfee explains the most damaging and noteworthy cyber attacks of all time.

dany and dragons

HBO hacked: Games of Thrones spoilers and other episodes leaked

HBO confirmed the attack but didn’t say what was stolen. However, the hackers say they have spoilers for the next Game of Thrones episode, plus unreleased episodes for other shows.

car wash

Hackers can hijack car washes, remotely trap and ‘physically attack’ people

Vulnerabilities in Internet-connected car washes could be exploited to trap or damage vehicles, as well as "physically attack" people.

fireeye logo

Hackers claim credit for alleged hack at Mandiant, publish dox on analyst

Late Sunday evening, someone posted details alleged to have come from a compromised system maintained by Adi Peretz, a Senior Threat Intelligence Analyst at Mandiant. The leaked records expose the analyst from both a personal and...


Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Election 2016 teaser - electronic voting button on blue circuitry

Def Con hackers showed how easily voting machines can be hacked

Hackers at Def Con's voting machine village made quick work of showing just how vulnerable "secure" voting machines really are.

State of Cybercrime 2017: Security events decline, but not the impact

Even as the average number of security events dropped year-over-year, events that resulted in a loss or damage rose, and fewer companies reported no losses.

Load More