Hacking

Hacking news, information, and how-to advice

Oracle to fix 167 vulnerabilities, including serious backdoor-like flaw in E-Business Suite

The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information

free advice cyclists outdoors people

Vulnerabilities in several Corel programs allow attackers to execute malicious code

Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said

011215 president barack obama

Obama proposes new 30-day data breach notification law

The president previewed a new data breach notification law today in a speech to the Federal Trade Commission

Obama revives call for immunity to companies sharing threat data

The president is expected to announce the liability protection and a measure to increase penalties for computer crimes on Tuesday

Obama calls for data breach notification law, privacy bill of rights

The White House will push Congress to pass new laws addressing data privacy and ID theft, the president says

Obama aims to tighten laws on data hacking and student privacy

The moves come in the wake of the hacks of Sony Pictures and retailers like Target and Home Depot

White House declines to act on petitions to fire Aaron Swartz prosecutors

Petitions are not the right mechanism for dealing with government personnel issues, the White House says

security phishing hook

Prevent phishing attacks with OpenDNS, 'Minority Report'-style

The use of big data analytics means potential threats can be blocked before your traditional malware defenses even know they exist

2014 timessquare

How much of 2014 in tech do you remember? Take our slightly silly quiz!

Mt. Gox? HP's split? WhatsApp? That was all this year, folks! See which stories you can still remember this late in the game.

Frequently asked questions about the North Korean Internet incident

Questions abound, but speculation is emerging

cyber security lock glow data

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

sony pictures studio tour

Sony admits employees' personal data may have been compromised by breach

Weeks later, Sony Pictures is telling employees what they already know about the scope of data that was compromised by attackers

crowd

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

Holding masses of data, cyber criminals face new hurdles to cashing out

Hackers are looking for new ways to get higher margins on stolen data

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyber espionage campaign, researchers from Kaspersky Lab say

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia

Technical evidence links destructive malware to attack against Sony Pictures

The malware contains usernames, passwords, and an image associated with Sony Pictures Entertainment, researchers said

anonymous spy privacy security

Blame China for the NSA's spying campaign on us all

'@War: The Rise of the Military-Internet Complex' explores the origins of the NSA’s war on privacy -- and Silicon Valley's complicity

Load More