Hacking

Hacking news, information, and how-to advice

Google Play
p1200588

2 two factor

Vastly improve your IT security in 2 easy steps

Losing the battle against the bad guys? Keep your software patched and defend against social engineering, and you might start winning a few

FBI Comey

FBI looks into Russian hack of US election, possible Trump involvement

Comey confirms government investigation into 'the nature of any links' between the Trump campaign and the Russian government, and shoots down Trump claims that former president wiretapped Trump Tower

dsc06024

Yahoo breach exposes the drawbacks of state-sponsored hacking

Relying on private hackers gives governments some deniability, but it can bring the whole scheme down

Russia

US faces limits in busting Russian agents over Yahoo breach

Wednesday's indictment is more about naming and shaming Russia over suspected state-sponsored hacking, experts said

video

Inside the Russian hack of Yahoo: How they did it

The U.S. Federal Bureau of Investigation has been investigating the intrusion for two years, but it was only in late 2016 that the full scale of the hack became apparent. On Wednesday, the FBI indicted four people for the attack, two...

twitter counter hacked

Twitter accounts hacked, Twitter Counter steps forward as culprit

It's the second time in four months that Twitter Counter has allowed hackers to post messages to high-profile Twitter accounts

security code big data cyberespionage DDoS

Mirai is the hydra of IoT security: too many heads to cut off

Some botnets have been disbanded, but new uses continue to emerge

shrugging man unknown question mystery

6 security essentials the CIA forgot

Good security isn't magic. Common-sense measures could have stopped all those secrets from being revealed and damaging the agency

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

alert hacking threat detected

How Android and iOS devices really get hacked

There are many ways to hack mobile devices, but the method people worry about is hard and relatively uncommon. You're more likely to get phished first

wikileaks

WikiLeaks will share CIA hacking details with companies, but can they use it?

The White House is reminding companies that accepting classified information is illegal

iphone 7 lightning port

Apple has already fixed most of the iOS exploits the CIA used

The company responded to information from a WikiLeaks release of CIA documents that claim the agency has ways to hack iPhones that Apple doesn't know about

security

4 strategies to root out your security risks

To defend yourself, you must first understand the security flaws that let bad guys exploit your environment

Trump inauguration

Pence used private mail for state work as governor, and account was hacked

The vice president’s AOL account -- which he used repeatedly to transact state business when he was governor -- was reportedly hacked

yahoo mail

Yahoo execs botched its response to 2014 breach, investigation finds

Yahoo's security team knew an intrusion had occurred in 2014, but the company failed to properly investigate, an internal committee has found

first google

Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

A security researcher claims he contacted the company about the breach weeks ago, but never received a response

security automation robot

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

Load More