Hacking

Hacking | News, how-tos, features, reviews, and videos

7 safe browswer search legitimate url domains surfing the internet

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

phishing hacker binary keyboard privacy security breach

Microsoft disrupted Russian hacking campaign aimed at US midterm elections

Microsoft brings down the hammer on Russian hacking campaign aimed at US midterm elections.

mobile apps crowdsourcing via social media network [CW cover - October 2015]

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Passenger view of an airplane wing above the clouds. / travel / journey / transportation

Where Chicken Little meets information security

Outside of a movie theater, your plane won’t be hacked out of the sky.

072315blog body camera

Security flaws in police body cameras open the devices to attack

A researcher presenting at Def Con 26 said security flaws in police body cameras could enable hackers to edit and delete footage and weaponize the devices with malware.

fax machine printer hardware

Attackers could ‘faxploit’ all-in-one printer to penetrate network and steal data

At Def Con 26, researchers revealed pwnage via fax. Hackers need only a fax number to infiltrate networks and exfiltrate data.

security breach egg reveal locks binary code hacked

3 reasons companies fail to assess the scope of a data breach

Best advice: Understand your data, have proper event logging in place, and test your incident response plan. (You do have one, don’t you?)

Network World: IoT Hacks [slide-07] > Heart Trouble > Surgically implatable IoT

Hacking pacemakers, insulin pumps and patients' vital signs in real time

At the recent Black Hat and Def Con events, researchers showed how they are able to hack medical devices, including pacemakers and insulin pumps, and patients' vital signs in real time.

security vulnerabilities in the IoT Internet of Things

Here I am, hack me

Bad actors are constantly trying to find ways to penetrate our networks. Recent attacks at LabCorp and the City of Atlanta demonstrate, however, that we are putting the welcome mat out for hackers by leaving key network ports open. ...

Bug bounty program

Bug bounties offer legal safe harbor. Right? Right?

Bug bounties are all the rage, but many programs do not offer legal safe harbor to good-faith security researchers who wish to report security issues. Caveat bug finder.

artificial intelligence / machine learning / network

Weaponized AI and facial recognition enter the hacking world

Your face could trigger a DeepLocker AI-powered malware attack or be used by Social Mapper to track you across social media sites.

cockroach bug binary2

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

danger

Hundreds of HP inkjet printer models vulnerable to critical remote code execution flaws

Hundreds of HP inkjet printer models are in desperate need of firmware patches before hackers start exploiting vulnerabilities to gain remote code execution.

Election 2016 teaser - A hacker pulls back the curtain on United States election data

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

vulnerable virus breach hacked cyber attack

Reddit discloses hack, says SMS intercept allowed attackers to skirt 2FA protections

Reddit, one of the largest websites on the internet, announced on Wednesday that someone was able to compromise staff accounts at their cloud and source code hosting providers, leaving backups, source code, and various logs exposed.

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Bounty for hacking the ‘unhackable’ Bitfi wallet jumps from $100K to $250K

Toss around claims about a device being unhackable, and they will come for you. Amid the drama, McAfee upped the bounty for hacking the Bitfi hardware crypto wallet to $250,000.

Bug bounty program

$10,000 for hacking HP printers: First bug bounty program for printer security

HP invited 34 security researchers to participate in its bug bounty program for printers, offering up to $10,000 per bug.

CSO: Have you met these hackers? [slide 02]

Rough trade: Why financial markets will need to stay on top of their game

While election hacking is making headlines and Dan Coats is warning about 9/11 style cyberattacks on the US, it is our financial markets that may require the most immediate laser focus. The future preservation of our financial...

Hacker in hoodie holding up finger to be quiet secret

Rapid7 penetration tests reveal multitude of software flaws, network misconfigurations

In 268 penetration tests, Rapid7’s testers exploited software flaws 84% of the time, abused network misconfigurations 80% of the time, and captured credentials 53% of the time.

Load More