Hacking

Hacking news, information, and how-to advice

cyberthief
The Forbidden City in Beijing

Average successful hack nets less than $15,000

Survey of cyber attackers shows the majority are motivated by money, but they make a quarter of what a cyber security professional makes

power grid electrical

How much at risk is the U.S. critical infrastructure?

The U.S. intelligence community is well aware that hostile hackers have gained access to portions of the nation’s critical infrastructure. But the debate about how big a threat it is rages on

russian hackers

Microsoft mirrors rivals, pledges to warn customers of state-backed hacks

Microsoft failed to alert more than a thousand Hotmail users as long ago as 2009, former employees claim

2015: The Year in Hacks

The most innovative and damaging hacks of 2015

The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead

juniper netscreen 5200 firewall

Attackers are hunting for tampered Juniper firewalls

An experiment with a 'honeypot' mimicking a Juniper firewall is seeing login attempts

security 2016 2

How computer security changed in 2015

We made progress, suffered setbacks, added complexity, and did little to deter the onslaught of cyber crime

worry concern nervous fret

10 things to worry about in 2016

Yes, it's the poignant sequel to last week's reprieve: a jolly list of worries to keep you up at night this holiday season

young man standing behind large red bullseye target

Attention, 'red team' hackers: Stay on target

You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws

120215 hacker

The biggest data breaches of 2015

From Ashley Madison to VTech, it has been a year of nasty data breaches

man in suit holding out huge fan of money

Hacking is a business -- and business is good

Price lists, Black Friday discounts, and hacking as a service are all part of the increasingly sophisticated underground economy of cyber crime

anonymous mask

How Anonymous really targets ISIS

With the ISIS attacks on Paris, Anonymous declared war on ISIS. The reality is that is more hype than fact, and misleading

Security online

Adobe patches flaws in ColdFusion, LiveCycle Data Services, and Premiere Clip

Adobe fixed important vulnerabilities in its ColdFusion application server, LiveCycle Data Services framework and Premiere Clip iOS app.

Inspecting a tablet magnifying glass businessman

7 keys to better risk assessment

When bad guys penetrate a network, too many defenders worry about what they stole rather than how they broke in. Focus on causes! Here's how

steel briefcase with chains and yellow caution tape

Search and seizure: Why everyone must fear hackers in the cloud

If public clouds are used for attacks on governments, as they surely will be, there's a risk enterprise data will be seized in the investigation too

gold

Securing big data, a cross-technology challenge

With all this valuable data in a single place, there are many reason why hackers are going after the data lake. Securing big data is a real challenge, but one that needs to be addressed properly

arithmetic math graffiti

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does

10 reasons why phishing attacks are nastier than ever

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros

victim identity theft computer problem

VBulletin resets passwords, issues emergency patches following breach

Evidence suggests that hackers had access to at least one zero-day exploit

Load More