Hacking

Hacking | News, how-tos, features, reviews, and videos

Russian hammer and sickle / binary code
CSO: Have you met these hackers? [slide 01]

CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Pentesting is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.

shocked, surprised men in a binary context

Top 8 weirdest, meanest and dumbest hacks of all time

Hackers have used some strange ways to break into networks or commit fraud. Not all are clever or smart.

black hat / hacker entering a binary room through a keyhole

11 top DEF CON and Black Hat talks of all time

Hacker summer camp is almost upon us again. Here are some of the best talks of all time. Will this year's virtual talks measure up to these legends?

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Twitter VIP account hack highlights the danger of insider threats

The account compromise raises questions about Twitter's controls. Experts weigh in on best practices for mitigating risk from malicious or accidental insider threats.

Binary code data flows through the cracked seal of a vault.

John the Ripper explained: An essential password cracker for your hacker toolkit

One of the oldest password cracking and testing tools, John the Ripper is still an essential pen testing tool.

HTTP prefix sympolizing a web address / URL/ domain being manipulated by a hacker.

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

hackathon contest computer competition hacking

Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges

New bill seeks to set up competitions across the US to spur security breakthroughs.

Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Distorted and glitched binary flag of the United States of America

Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking.

honey jar dripper

Avoiding the pitfalls of operating a honeypot

Businesses should think very carefully before moving forward with any honeypot project.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

How a bank got hacked

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern.

tt19 054 thumb
video

Printers: The overlooked security threat in your enterprise | TECHtalk

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus...

6 small business security

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack.

Capital One  >  hack

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns.

ransomware healthcare breach hacker

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target.

Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.

binary code matrix

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.

Load More
You Might Also Like