Hacking news, information, and how-to advice

anonymous mask
Security online

Inspecting a tablet magnifying glass businessman

7 keys to better risk assessment

When bad guys penetrate a network, too many defenders worry about what they stole rather than how they broke in. Focus on causes! Here's how

steel briefcase with chains and yellow caution tape

Search and seizure: Why everyone must fear hackers in the cloud

If public clouds are used for attacks on governments, as they surely will be, there's a risk enterprise data will be seized in the investigation too


Securing big data, a cross-technology challenge

With all this valuable data in a single place, there are many reason why hackers are going after the data lake. Securing big data is a real challenge, but one that needs to be addressed properly

arithmetic math graffiti

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does

10 reasons why phishing attacks are nastier than ever

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros

victim identity theft computer problem

VBulletin resets passwords, issues emergency patches following breach

Evidence suggests that hackers had access to at least one zero-day exploit

Winner claimed in $1 million iOS 9 hacking contest

Bug bounty firm Zerodium will make the vulnerability information available to its customers

hack hacker cyber thief theft stolen

5 signs your Web application has been hacked

Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all

obama and xi

China reportedly tries to hack U.S. businesses the day after agreeing not to

Security firm CrowdStrike says Chinese hacker tried to breach seven tech and pharma companies

rainy traveler businessmen

Road warriors are prime targets for hackers

Here are some steps companies and executives can take to enhance travel-related security


9 notorious hackers: Who they are, why they did it

On the Internet, nobody knows you're not in the mafia

email security

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is as good -- and far easier to compromise?

steal thief theft burglar laptop secret crime

Researchers steal secret RSA encryption keys in Amazon's cloud

Now-patched attack raises questions about security of cloud environments

Security online

Scottrade had no idea about data breach until the feds showed up

The breach affected around 4.6 million customers' names and addresses

Android character at MWC

New Android vulnerabilities put over a billion devices at risk of remote hacking

The flaws are located in Android's media processing components and can be exploited through maliciously crafted websites

error signal television problem broken

The No. 1 problem with computer security

Everyone focuses on the wrong threats. You've undoubtedly been breached already, so the key is to collect data that can help you prevent attackers from succeeding again

handshake us flag

U.S., China reach 'common understanding' on cyber attacks

No one expected sanctions or an actual cyber security truce, but as agreements go, this one is as toothless as it gets

us china relations flag

What to expect in the US-China cyber treaty

After weeks of meetings, the U.S. and China appear to be on the verge of an historic first agreement on hacking and cyber espionage, but what might a deal actually accomplish?

Load More