Hacking

Hacking | News, how-tos, features, reviews, and videos

Binary code data flows through the cracked seal of a vault.
HTTP prefix sympolizing a web address / URL/ domain being manipulated by a hacker.

hackathon contest computer competition hacking

Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges

New bill seeks to set up competitions across the US to spur security breakthroughs.

Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.

CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Distorted and glitched binary flag of the United States of America

Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking.

honey jar dripper

Avoiding the pitfalls of operating a honeypot

Businesses should think very carefully before moving forward with any honeypot project.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

How a bank got hacked

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern.

tt19 054 thumb
video

Printers: The overlooked security threat in your enterprise | TECHtalk

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus...

6 small business security

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack.

Capital One  >  hack

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns.

ransomware healthcare breach hacker

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target.

Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.

binary code matrix

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

Sharks and phishers are circling, looking to snag a bite

Security professionals need to work together to come up with effective threat strategies, better training and intelligence alert systems in effort to keep phishing attacks at a minimum.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

What are the security implications of Elon Musk's Neuralink?

Wacky science fiction has come to life with Elon Musk’s latest idea: chips implanted in human heads that talk to smart devices. What could possibly go wrong?

credit card hack financial breach stealing money traffiking financial data target by igphotography

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks.

black hat / hacker entering a binary room through a keyhole

11 top DEF CON and Black Hat talks of all time

Hacker summer camp in Vegas is almost upon us again. Here are some of the best talks of all time. Will this year's talks measure up to these legends?

Bitcoin cryptocurrency falling.

Lack of trust will doom crytpocurrency

Loss of crypto coins through hacks, fake trading and volatility destroy trust in cryptocurrency, but those aren't its only problems.

Load More
You Might Also Like