Hacking

Hacking news, information, and how-to advice

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

eye binary IDS Intrusion Detection System

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

group chat services - Telegram

Hackers exploit zero-day flaw in Telegram to mine cryptocurrency

Kaspersky Lab researchers discovered a zero-day flaw in Telegram Messenger's desktop client that was exploited to mine cryptocurrency or to install a backdoor.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

2018 Winter Olympics – Opening ceremony – PyeongChang, South Korea – February 9, 2018

Winter Olympics hit with cyber attack during opening ceremony

Officials confirm that a cyber attack caused issues during the 2018 Winter Olympics opening ceremony in PyeongChang.

Equifax credit bureau logo and building security breach

Equifax hackers may have stolen more data than originally revealed

A document submitted by Equifax to the Senate Banking Committee shows attackers may have also stolen tax ID numbers, additional driver’s license and credit card details, email addresses and phone numbers.

cyberattack laptop arrows war fight

Kaspersky: Accidental DDoS attacks among top threats

Kaspersky Lab's Q4 2017 DDoS Intelligence Report found most DDoS attacks were sabotage and attempts to cash in on Bitcoin, but some were accidental attacks.

steal theft hacker crime laptop firewall

3 leaked NSA exploits work on all Windows versions since Windows 2000

The EternalSynergy, EternalRomance, and EternalChampion exploits have been reworked to work on all vulnerable Windows versions: Windows 2000 -- Server 2016.

healthcare data breach ts

Why healthcare cybersecurity spending will exceed $65B over the next 5 years

Hospitals and healthcare providers remain under cyber attack, causing organizations to spend more to protect their systems and patient data.

domain name systems dns

Experts are predicting automated lateralization attacks against Windows domains

Here’s how to prepare...

learn basics of ethical hacking

What is penetration testing? Ethical hacking basics and requirements

Penetration testing, or ethical hacking, is an in-demand skill for evaluating an organization’s defenses. Here’s what it entails and tips for breaking into the role.

Diablo III: Reaper of Souls

Hackers could have exploited flaw in all Blizzard games

Blizzard stopped talking with the Google security researcher who discovered the flaw and bungled the silently deployed patch to stop hackers from hijacking millions of PCs.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

job search machine learning ai artifical intelligence robotics automation

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

Android mobile phone

Dark Caracal: Hacking group targets Android smartphones

An advanced persistent threat (APT) group named Dark Caracal used Android spyware to steal hundreds of gigabytes of sensitive data from more than 21 countries.

nuclear bomb test bikini atoll mushroom cloud explosion detonate

Pentagon considers nuclear response to retaliate for large cyber attacks

A draft for the Pentagon’s 2018 Nuclear Posture Review says the U.S. would consider using nuclear weapons to respond to non-nuclear attacks.

datacenter servers warehouse database

Contractor hacks former employer, destroys and corrupts data

Edward Soybel was let go by W. W. Grainger and subsequently hacked his way back into the company to access customer databases to destroy and corrupt the data.

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

cloud security ts

The hackers are coming: 6 cloud computing trends you will see in 2018

Growth is good, and will bring many changes to the cloud industry. But not all changes will be good, especially when it comes to security.

Load More