-
+14 +1
Chinese Hackers Force Penn State to Unplug Engineering Computers
Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.
-
+9 +1
Pwnd.
If I were a black hat… I bet I could pwn you. (No n00b, that was not a typo.) I want to steal your credit card number, get access to your bank account, and embarrass you by posting to your social networks. Or maybe I have a larger goal, and you’re just a necessary casualty in my master plan.
-
+1
how to hack facebook account
-
+1
Free website for ethical hacking
-
Unspecified+1 0
Ethical Hacking
All About Ethical Hacking,Decompile android app,Reverse Engineering the android applcation, Forensic Tools,Data recovery tools, Vapt Tools,Hacking News, Mobile Hacking ,Pentesting via mobile, Network Hacking, Network Security,Virus Writing,VirusTesting,Virus Detecting ,Proxy Servers,Types of proxy,Detecting proxy,Stegnography,Cryptography,Security Tools,Tips and tricks,Ethical hacking course book,Pentesting course book,Linux course book,Python course book,Books related to ethical hacking,...
-
+2 +1
Types of Hackers | WhiteHat | GreyHat | BlackHat
In all these cases it is illegal. We have made a list of types of hackers. We will not explain each of them here separately to give you a quick idea.
-
+1 +1
Lenovo website DNS record hijacked | ZDNet
Lenovo's Superfish debacle seems to have drawn the ire of the Lizard Squad hackers.
-
+17 +1
Hacker Claims Feds Hit Him With 44 Felonies When He Refused to Be an FBI Spy
A year ago, the Department of Justice threatened to put Fidel Salinas in prison for the rest of his life for hacking crimes. But before the federal government brought those potentially life-ending charges against him, Salinas now says it first tried a different tactic: recruiting him.
-
+18 +1
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific conference they attended in Houston. The scientists didn't know it then, but the disc also delivered a malicious payload developed by a highly advanced hacking operation that had been active since at least 2001. The CD, it seems, was tampered with on its way through the mail.
-
+19 +1
Lizard Squad Claims to Take Down Facebook, Instagram, Tinder (Briefly)
Overnight, reports circulated about Facebook and Instagram going dark. Now, Lizard Squad is claiming to have taken down a large handful of sites--albeit briefly.
-
+15 +1
How criminals clone your card
The BBC's Rory Cellan-Jones finds out how criminals go about cloning your card.
-
+16 +1
This Fake Phone Charger Is Actually Recording Every Key You Type
“Whose phone charger is that sticking out of the wall? Oh. It must be Ben’s. Ben always leaves his charger at work. Classic Ben!” Alas, it’s not Ben’s charger. Hell, it’s not a charger at all. It’s actually a little spy device disguised as a phone charger, capable of sniffing out every key you type on that wireless keyboard on your desk. Oh, and it can send the stuff it picks up straight to the eavesdropper’s phone. Oh! Oh! And it’ll keep working even if...
-
+16 +1
N.S.A. Tapped Into North Korean Networks Before Sony Attack, Officials Say
The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth.
-
+5 +1
How My Mom Got Hacked
MY mother received the ransom note on the Tuesday before Thanksgiving. It popped up on her computer screen soon after she’d discovered that all of her files had been locked. “Your files are encrypted,” it announced. “To get the key to decrypt files you have to pay 500 USD.” If my mother failed to pay within a week, the price would go up to $1,000. After that, her decryption key would be destroyed and any chance of accessing the 5,726 files on her PC — all of her data — would be lost forever.
-
+23 +1
'Born at the Right Time': How Kid Hackers Became Cyberwarriors
A few years ago, when Greg Martin was in his mid 20s and teaching a computer security course for NASA engineers, he stumbled on an arcane bit of information that stopped him cold: the original set of rules governing the Internet, created in September 1981, the month he was born.
-
+5 +1
Senate staffer tries to scrub 'torture' reference from Wikipedia's CIA torture article
An anonymous Wikipedia user from an IP address that is registered to United States Senate has tried, and failed, to remove a phrase with the word "torture" from the website's article on the Senate Intelligence Committee's blockbuster CIA torture report. The unknown individual has attempted on at least two occasions — first on Dec. 9 and then on Dec. 10 — to remove a line describing the CIA's enhanced interrogation techniques as "a euphemism for torture."
-
+15 +1
The Sony Pictures Hack Was Even Worse Than Everyone Thought
Sony Pictures suffered a pretty devastating hack last week. In fact, according to documents recently leaked on the web, it looks like Sony Pictures might've just suffered one of the worst corporate hacks in history. Salary numbers, layoff strategies, personal details of laid off staffers, and some 3,800 Social Security numbers are now out in the open.
-
+21 +1
For Guccifer, Hacking Was Easy. Prison Is Hard.
He reveled in tormenting members of the Bush family, Colin L. Powell and a host of other prominent Americans, and also in outfoxing the F.B.I. and the Secret Service, foiling their efforts to discover even his nationality, never mind his identity. Early this year, however, the elusive online outlaw known as Guccifer lost his cocky composure and began to panic.
-
+23 +1
Somebody is snooping on CEOs by hacking hotel wi-fi
“CEOs, senior vice presidents, sales and marketing directors and top R&D staff.” These are the people who have been targeted by Darkhotel, a sophisticated security threat, as they check into hotels around the world, according to a new report (pdf) by Kaspersky Labs, an online security firm. The vast majority of infections occurred in Japan, followed by Taiwan, China, Russia, South Korea, and other Asian nations. Germany and the US also figure on the list.
-
+19 +1
China suspected of breaching U.S. Postal Service computer networks
Chinese government hackers are suspected of breaching the computer networks of the United States Postal Service, compromising the data of more than 800,000 employees — including the postmaster general’s.
Submit a link
Start a discussion