Hacking

Hacking news, information, and how-to advice

Researchers find holes in routers supplied by ISPs
healthcare it security jobs

Startup takes heat over online tool that checks Ashley Madison data

Trustify was accused of spamming email addresses that showed up in the leak

changed priorities

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

Hackers show off long-distance Wi-Fi radio proxy at DEF CON

The device uses the 900Mhz band but hides the data in the background radio noise

Researchers develop astonishing Web-based attack on a computer's DRAM

The Rowhammer problem can be exploited using JavaScript over the Web, researchers have found

Cyber Skull

From dating to driving, hackers hit where it hurts

Ashley Madison, Jeep, probably whatever smartwatch you're perusing -- there is no limit to where and when hackers can strike

broken heart candy

The Ashley Madison hack -- this time it's personal

In the wake of the OPM data breach, another grim reminder of the folly of hobbling encryption

vendetta conspiracy masks costume

Evil conspiracy? Nope, everyday cyber insecurity

You don't need crackpot conspiracy theories to foretell a wide-scale security cataclysm. Mundane vulnerabilities increase the probability every day

Hacking Team's arsenal included at least three unpatched exploits for Flash Player

The vulnerabilities leveraged by two of the exploits have yet to be patched

glacier bridge

11 essential hacks for a better (tech) life

Whether you want to lower your cellphone bill or find true love, there's usually a way around your problems

caped superhero

In the security world, the good guys aren't always good

It's hard enough to fix Internet security without bad behavior from many of the entities that are supposed to be protecting our interests

hacking team

Hacking Team hack reveals why you shouldn't jailbreak your iPhone

A massive breach in the private data of a firm that sells software to governments to spy on communications shows that jailbroken iPhones are vulnerable

Adobe patches zero-day Flash Player flaw used in targeted attacks

The vulnerability has been exploited by a China-based cyberespionage group for several weeks, security firm FireEye says

data breach

7 things to do when your business is hacked

Hint: Success of the incident response team will depend heavily on the preparation done before the breach

How encryption keys could be stolen by your lunch

A device hidden in pita bread can collect signals that can betray encryption keys

Extreme Hacks to Be Paranoid About

Be paranoid: 10 terrifying extreme hacks

Nothing is safe, thanks to the select few hacks that push the limits of what we thought possible

coins

Breach costs: 'Chump change' to bottom lines of big players

The direct costs of a data breach barely affect the bottom line of the nation’s biggest enterprises, but for smaller players the damage can be catastrophic

superhero

John McAfee: The hero we need, not the one we deserve

As our elected leaders show they can botch data security in new and unexpected ways, an unlikely figure steps up with sage words

broken window glass crack holes

Time to address your 100,000 vulnerabilities

You know your security has weak spots, but it's hard to know where to begin -- this might get you on track

Load More