Hacking

Hacking news, information, and how-to advice

security threats and vulnerabilities

How a vulnerability disclosure policy lets hackers help you

Does your company have a vulnerability disclosure policy (VPD)? And if not, what might it mean for your security?

electricity coal power

Combating cyber threats in critical infrastructure through due diligence

Regardless of the implementation method, it’s important for critical infrastructure industries to assess their cybersecurity risks and to protect themselves. An optimal way to start is to adopt the NIST CSF, which will bring depth and...

fact fiction debunk myths truth

6 myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.

location symantec headquarters exterior 300dpi

Symantec: Diverse threats remain a consistent problem online

A report published this evening by Symantec outlines the rocky year consumers and business owners had online in 2017, covering everything from coin mining attacks, problems in the supply chain, ransomware, BEC attacks, and more.

russian hackers

Toe-to-toe with the Roosskies

Russia is hardly, if at all, deterred by sanctions. Until Uncle Sam puts his kinetic foot down, Russian Intrusions and campaigns will continue and most likely increase.

vulnerable cryptojacking hacking breach security

Cryptomining: the new lottery for cybercriminals

With more than 500 million PCs actively mining cryptocurrency worldwide, you have to wonder how many compromised websites exist.

pepper robot

Ransomware: Coming to a robot near you soon?

A a proof-of-concept hack at the Kaspersky Security Analyst Summit showed how robots could be infected with ransomware.

capture the flag hackathon face off

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.

ddos attack

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

artificial intelligence ai brain virtual

Is your vendor being honest about AI?

Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie.

2018 Winter Olympics – Opening ceremony – PyeongChang, South Korea – February 9, 2018

Russia hacked Olympic computers and tried to frame North Korea

U.S. officials said the “false-flag” hacking operation conducted by the Russian GRU was supposed to make it look like North Korea accessed hundreds of Olympic-related computers.

ransomware

5 tips to help you block ransomware

Learn about best practices to combat the threat of ransomware.

mobile phone hacked

AI on-device

A decentralized approach will allow users to take back ownership of their personal information, while protecting them from major breaches.

03 cryptography

Why aren't we using SHA-3?

The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.

Hooded man hacking computer with green binary background

Hacking is a booming business, and it’s time for a disruption

Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our...

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain

Hackers exploit Jenkins servers, make $3 million by mining Monero

Hackers exploiting Jenkins servers made $3 million in one of the biggest malicious cryptocurrency mining operations ever.

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

Load More