Hacking

Hacking news, information, and how-to advice

Large-scale attack hijacks routers through users' browsers

Security researchers have found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

ice sculpture frozen freezing cold

hipster dude

One security hepcat's guide to the groovy new tech slang

Did you hear? 'Social engineering' has gone the way of the hula hoop. Get ready for 'wetware,' the latest threat to your network

Critical vulnerability in NetUSB driver exposes millions of routers to hacking

Tens of routers and other embedded devices from various manufacturers likely have the flaw, security researchers say

Login system supplies fake passwords to hackers

The research project ErsatzPasswords aims to stop the cracking of password hashes

Aaron Swartz

Second time's the charm? The welcome return of Aaron's Law

Congress can finally right its wrongs with the Aaron Swartz tragedy with the passing of this much needed cyber crime bill

airplanes flight paths

Can you hack an airplane? Brace yourself

Suddenly, everyone is worried about malicious hackers breaching networks connected to airplane control systems

android chorus

For Android, adware is the threat, not malware

Security alarmists have grossly exaggerated the risk of mobile devices -- and the cost of security breaches

Researchers: IoT devices are not designed with security in mind

Lack of encryption and other security issues were found in home automation hubs that could facilitate burglary, stalking, and spying

Internet of Things hack security smart home

Smart home hacking is easier than you think

Scary stories of hacking Internet of Things devices are emerging, but how realistic is the threat?

thermometers cold warm hot temperature

6 reasons why heat-based attacks won't happen

Oh, those security researchers, always coming up with exotic new ways to penetrate systems -- but the BitWhisper attack on air-gapped systems is especially far-fetched

Slack hacked, compromising users' profile data

After suffering a hack last month, the company has added two-factor authentication

Zero day, Web browser vulnerabilities spike in 2014

The good news: More than 83 percent of vulnerabilities had patches ready when the flaws became public

hammer 154045038

Hardware exploits may be a sign of threats to come

Hardware exploits like Rowhammer are rare, so companies don't take them seriously, but they should -- because more are looming

All major browsers hacked at Pwn2Own contest

Adobe Reader and Flash Player fell to security researchers as well

connected home illustration internet of things IoT

Smart home or dumb security risk?

Internet-connected devices are flooding into homes, but with convenience comes vulnerability

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database

hacked hacker breach security

You’ve been hacked. Now what?

6 key things to do after a security breach

Researcher releases 10 million usernames, passwords from data breaches

The data is already public but has been cleaned up to enable better analysis

Oracle to fix 167 vulnerabilities, including serious backdoor-like flaw in E-Business Suite

The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information

Load More