Hacking

Hacking | News, how-tos, features, reviews, and videos

tre18 007 nestnews2
Election 2016 teaser - Electronic voting security for digital election data

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

a hand holding a key moves toward an @ symbol with many locks

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability.

facial recognition - biometric security identification

Police can't force you to unlock your phone with face, finger or any biometrics

A judge in California ruled that law enforcement officials can’t force people to unlock their smartphones with a finger or thumbprint, facial recognition, or even an iris.

location

Wireless carriers still selling Americans’ real-time location data

Wireless carriers didn't keep their promises, as American's real-time location data is still being sold by third parties and shady folks.

01 underattack

Ethereum Classic cryptocurrency suspended after attackers steal nearly $1.1M

Coinbase de-listed Ethereum Classic (ETC) cryptocurrency after double spends of nearly $1.1 million were detected.

alarm ambulance emergency red

Australian emergency warning system hacked, thousands receive alerts

A hacker took control of Australia’s Early Warning Network and sent an alert to thousands that said their personal data is not safe.

35th chaos communication congress

Hacking skills on display at the 35th Chaos Communication Congress

35th Chaos Communication Congress had hackers spoofing a vein authentication system with a wax hand, showing off hardware wallet hacks, and outlining the first UEFI rootkit.

ransomware hack

Hacker posts ransom demand on Dublin's Luas tram system site

The website for Dublin’s tram system Luas was hacked, with the hacker threatening to leak the company’s private data if the ransom was not paid within the next five days.

ransomware

Major US newspapers crippled by Ryuk ransomware attack

All Tribune Publishing newspapers, as well as US-printed newspapers formerly part of Tribune, were hit with a cyber attack involving Ryuk ransomware.

hack hacker hacked

The most interesting and important hacks of 2018

The hacks, exploits and data breaches security researcher need to most pay attention to are those that do something new or suddenly increase in volume.

Facebook / privacy / security / breach / wide-eyed fear

Facebook let Netflix, Spotify read your private messages

Facebook offered user data to more than 150 companies, ranging from tech and entertainment companies to online retailers, automakers, and even banks.

Hacking stealing password data

Attacking from inside, cyber crooks rake in millions from banks

Crooks stole tens of millions of dollars from banks with hacks involving hidden devices and direct connections to local networks.

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Hackers get into National Republican Congressional Committee's email system

The National Republican Congressional Committee's email system was hacked leading up to midterm elections.

marriott breach

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches.

phishing hacker binary keyboard privacy security breach

Hacker adds malicious bitcoin-stealing code to popular JavaScript library

An NPM package with 2 million weekly downloads had malicious code injected into it. Plus, more problems arise from the Windows 10 October 2018 Update.

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Load More