Hacking

Hacking | News, how-tos, features, reviews, and videos

financ stock market skyline

Dow Jones watchlist of high-risk businesses, people found on unsecured database

A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server.

learn basics of ethical hacking

What is ethical hacking? How to get paid to break into computers

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and the certifications and training you need to become an ethical hacker.

alone at night along a dimly lit path / security / suspicious / threat / hacker

Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through...

A hooded man in a halloween mask raises a finger to his lips to encourage silence.

North Korean hackers target Russian-based companies

The North Korean Lazarus APT group is going after the Russians. Russian hackers, however, needed less than 20 minutes in 2018 to completely pwn an organization.

capture the flag hackathon face off

Top tools and resources for running a capture the flag competition

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event.

man sitting on chair on dirt road tornado overwhelmed overworked stressed disruption disaster recov

Disastrous cyber attack on email provider wipes US servers and backups

A cyber attack on email provider VFEmail caused “catastrophic destruction,” with hackers wiping the servers and backups.

man in the middle phone on a string communicaiton

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

xiaomi m365 scooter

Popular electric scooters can be remotely hacked

Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate.

07 surveys

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging.

security threats and vulnerabilities

5 signs you've been hit with an APT

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

Security flaws in baby cam monitors

Hijacked Nest devices highlight the insecurity of the IoT

Internet of Things (IoT) devices, such as Nest cameras and thermostats, continue to be hacked. To prevent that, follow smart password practices and turn on 2FA.

hackathon students code programmer devops certification by rawpixel unsplash

OSCP cheating allegations a reminder to verify hacking skills when hiring

A former student’s claim of widespread cheating on the OSCP exam underscores need to test security job candidates.

ransomware breach hackers dark web

Law enforcement shuts down xDedic marketplace for hacked servers

Cooperation among multiple agencies in the U.S. and Europe close a marketplace that sold access to servers hacked through RDP attacks.

data privacy ts

Privacy groups blast Google, IAB over data leak via ad auctions

New evidence to an ongoing GDPR complaint shows how ad categories used by Google and the Internet Advertising Bureau (IAB) profile you and apply potentially sensitive labels to you.

tre18 007 nestnews2

Hijacked Nest camera blares warning about North Korean missiles headed to U.S.

A hacker hijacked a Nest security camera and blasted a warning about three North Korean intercontinental ballistic missiles headed to Los Angeles, Chicago, and Ohio.

Election 2016 teaser - Electronic voting security for digital election data

Why one of America’s top experts is hopeful for better election security

Voting machines and elections in general are still vulnerable to hacking, says Matt Blaze, but adoption of risk-limiting audits and software independence gives opportunity for improvement.

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

a hand holding a key moves toward an @ symbol with many locks

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability.

facial recognition - biometric security identification

Police can't force you to unlock your phone with face, finger or any biometrics

A judge in California ruled that law enforcement officials can’t force people to unlock their smartphones with a finger or thumbprint, facial recognition, or even an iris.

location

Wireless carriers still selling Americans’ real-time location data

Wireless carriers didn't keep their promises, as American's real-time location data is still being sold by third parties and shady folks.

Load More