Hacking

Hacking | News, how-tos, features, reviews, and videos

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain

Hackers steal $23.5M in cryptocurrency from 'decentralized' crypto exchange Bancor

Attackers used a compromised wallet to steal three different cryptocurrencies: $12.5 million of ether, $1 million of Pundi X, and $10 million of Bancor Network Tokens.

gas pump car gas tank hacked gas station

Thieves hack Marathon gas station, steal $1,800 of gas

Hackers used a 'remote device' to steal 600 gallons of gas, valued at $1,800, from a prepaid Marathon gas pump in Detroit.

patreon logo

No data breach at Patreon, but proactive notice caused some concern

Patreon, the membership platform that helps creators get paid for their work, sent users a letter on Monday warning them about a data breach at Typeform. But the proactive letter caused some panic, as more than a few people took it to...

us china russia

Akamai: DDoS attacks on the rise, become more specialized

Akamai's new State of the Internet/Security: Web Attack report says DDoS attacks increased 16% since 2017. It also says China and Russia launch the most credential abuse attacks on the hospitality industry.

google home mini

Decade-old attack can pwn Google Home, Chromecast, Sonos and Roku

Several IoT devices are vulnerable to DNS rebinding attacks that could allow attackers to get your geographic location, gather recon for future attacks, or remotely control the devices.

think ponder reflect

Cybersecurity – how confident (complacent?) are you?

Cybersecurity must be a process of continual evolution: just because you feel protected today doesn’t mean you will be tomorrow.

switchboard operators

Rose-colored glasses and sepia-tinted memories

We view history through a rose-colored tint. People often leave out the historical context of events and why they occur. Understanding the evolution of systems and their context allows us to better comprehend past decisions and keep...

submarine periscope 101722825

Chinese hackers stole 614GB of undersea warfare data from U.S. Navy contractor

Chinese hackers reportedly stole hundreds of gigabytes of undersea warfare data from a contractor which works for the U.S. Navy’s underwater weapons R&D center.

Security flaws in baby cam monitors

Another baby monitor camera hacked

The latest baby monitor hacking incident involves a $34 FREDI wireless baby camera monitor. The hacked device was used to spy on a mother and her baby.

Election 2016 teaser - Electronic voting, digital ballot boxes

How elections are hacked via social media profiling

What to expect in the 2018 midterm elections and how malvertising tactics will be used to target voters.

north korea statue pyongyang

FBI, DHS warn of North Korean RAT and worm malware

The U.S. government released an alert about two strains of North Korean malware that are being used by Hidden Cobra.

thinkstockphotos canada flag

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce’s Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers.

TSB Phishing page

Salted Hash – SC 02: What a TSB phishing attack looks like

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result,...

group of hackers in digital environment

FBI: Reboot your home and small office routers to counter Russian malware

The FBI, DHS and DoJ advised rebooting your router to clear it from advanced stages of the Russian-linked malware VPNFilter.

access computer through your phone skeleton key unlocking

How IAM can help move the finish line for hackers

Identity and access management can be leveraged by an enterprise to secure a network that might already be compromised. Here's how...

email security risk - phishing / malware

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees.

mute google home amazon echo

Voice squatting attacks: Hacks turn Amazon Alexa, Google Home into secret eavesdroppers

Researchers devise new two new attacks -- voice squatting and voice masquerading -- on Amazon Alexa and Google Home, allowing adversaries to steal personal information or silently eavesdrop.

ransom locked encrypt

Preventing ransomware attacks the right way

Ransomware attacks continue to be a major threat with no sign of slowing down. Here are some lessons organizations can learn from federal agencies to better prevent them.

leaking binary data pouring through one's hands

Let’s get serious about security: 2.6 billion records stolen or compromised in 2017

Gemalto’s 2017 Breach Level Index found 2.6 billion records were compromised in 2017, as well a number of new data breach tactics. Breached or exposed data is not only a headache for security teams. It also impacts brand reputation,...

orange monitors with lock icon network security cyber threat

Fighting fraud: Tips for getting ahead of the ever-evolving threat

Fraud is largely inevitable but fighting it doesn’t have to be fruitless. Chris Camacho shares tips to help businesses combat this threat more effectively.

Load More