Hacking

Hacking news, information, and how-to advice

Researchers develop astonishing Web-based attack on a computer's DRAM

The Rowhammer problem can be exploited using JavaScript over the Web, researchers have found

Cyber Skull

broken heart candy

The Ashley Madison hack -- this time it's personal

In the wake of the OPM data breach, another grim reminder of the folly of hobbling encryption

vendetta conspiracy masks costume

Evil conspiracy? Nope, everyday cyber insecurity

You don't need crackpot conspiracy theories to foretell a wide-scale security cataclysm. Mundane vulnerabilities increase the probability every day

Hacking Team's arsenal included at least three unpatched exploits for Flash Player

The vulnerabilities leveraged by two of the exploits have yet to be patched

glacier bridge

11 essential hacks for a better (tech) life

Whether you want to lower your cellphone bill or find true love, there's usually a way around your problems

caped superhero

In the security world, the good guys aren't always good

It's hard enough to fix Internet security without bad behavior from many of the entities that are supposed to be protecting our interests

hacking team

Hacking Team hack reveals why you shouldn't jailbreak your iPhone

A massive breach in the private data of a firm that sells software to governments to spy on communications shows that jailbroken iPhones are vulnerable

Adobe patches zero-day Flash Player flaw used in targeted attacks

The vulnerability has been exploited by a China-based cyberespionage group for several weeks, security firm FireEye says

data breach

7 things to do when your business is hacked

Hint: Success of the incident response team will depend heavily on the preparation done before the breach

How encryption keys could be stolen by your lunch

A device hidden in pita bread can collect signals that can betray encryption keys

Extreme Hacks to Be Paranoid About

Be paranoid: 10 terrifying extreme hacks

Nothing is safe, thanks to the select few hacks that push the limits of what we thought possible

coins

Breach costs: 'Chump change' to bottom lines of big players

The direct costs of a data breach barely affect the bottom line of the nation’s biggest enterprises, but for smaller players the damage can be catastrophic

superhero

John McAfee: The hero we need, not the one we deserve

As our elected leaders show they can botch data security in new and unexpected ways, an unlikely figure steps up with sage words

broken window glass crack holes

Time to address your 100,000 vulnerabilities

You know your security has weak spots, but it's hard to know where to begin -- this might get you on track

Large-scale attack hijacks routers through users' browsers

Security researchers have found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

ice sculpture frozen freezing cold

How to stop Wi-Fi hackers cold

When someone hacked a neighbor's Wi-Fi router to engage in nefarious activities, the only effective defense was to plug a widespread WPS vulnerability

hipster dude

One security hepcat's guide to the groovy new tech slang

Did you hear? 'Social engineering' has gone the way of the hula hoop. Get ready for 'wetware,' the latest threat to your network

Critical vulnerability in NetUSB driver exposes millions of routers to hacking

Tens of routers and other embedded devices from various manufacturers likely have the flaw, security researchers say

Login system supplies fake passwords to hackers

The research project ErsatzPasswords aims to stop the cracking of password hashes

Load More