Hacking

Hacking news, information, and how-to advice


fivetotry nov20 gameofthrones

Winter is coming. Protect your content kingdom

The struggles that HBO is facing are prime examples of a breach of confidentiality by a trusted user or group who bypassed multiple security controls to leak sensitive intellectual property

Hacking stealing password data

How to prevent the hacked AI apocalypse

Adversarial attacks can undermine AI systems, sidelining their intelligence and hijacking them for evil. But there are emerging techniques to block such attacks

Blackhat_2017
video

Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Blackhat_2017
video

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available...

Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

The dark web's changed
video

How the dark web has gone corporate

Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.

the 16 worst data security breaches
video

The 16 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 16 breaches and their overall impact on customers or employees.

virtualization

How to handle risks of hypervisor hacking

Without hypervisors, digitalization, which has already irrevocably changed the way 21st Century business works, would be severely crippled. Therefore, most individuals and organizations willingly overlook the vulnerability of the...

hacker

Digital signature service DocuSign hacked and email addresses stolen

DocuSign had last week warned of phishing emails that spoofed its brand

nsa aerial

Microsoft blames US stockpiled vulnerability for WannaCry ransomware attack

The stockpiling of vulnerabilities by governments is a big problem, the company said

quell cyber attacks primary

How the Macron campaign slowed cyberattackers

Did the French president-elect's security team use cyberdeception techniques to fight off phishing attacks? Submitting fake credentials definitely qualifies

intelamt

Vulnerability hits Intel enterprise PCs going back 10 years

The security hole involves enterprise IT remote management features in the chipmaker’s firmware

security code big data cyberespionage DDoS

Network management vulnerability exposes cable modems to hacking

SNMP authentication bypass flaw could be used to hijack hundreds of thousands of cable modems from around the world

shield protection

Foiled! 15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks coordinated by a single group

The campaigns are bigger and more sophisticated, and they're causing far more damage as the attackers learn new techniques and collaborate with other groups

img 20170425 150053 01

Old Windows Server machines can still fend off hacks. Here's how

Many businesses still use Windows Server 2003, even as Microsoft no longer supports the OS

Legislation of privacy security keyboard law legal gavel court ruling

Russian man receives longest-ever prison sentence in the US for hacking

The son of Russian parliament member Valery Seleznev was sentenced to 27 years in prison for cybercrime-related offences

Load More