Hacking

Hacking news, information, and how-to advice

russian hackers
vulnerable cryptojacking hacking breach security

pepper robot
By

Ransomware: Coming to a robot near you soon?

A a proof-of-concept hack at the Kaspersky Security Analyst Summit showed how robots could be infected with ransomware.

capture the flag hackathon face off

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.

salted hash thumbnail final
video

Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game...

ddos attack

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

artificial intelligence ai brain virtual

Is your vendor being honest about AI?

Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie.

2018 Winter Olympics – Opening ceremony – PyeongChang, South Korea – February 9, 2018
By

Russia hacked Olympic computers and tried to frame North Korea

U.S. officials said the “false-flag” hacking operation conducted by the Russian GRU was supposed to make it look like North Korea accessed hundreds of Olympic-related computers.

ransomware

5 tips to help you block ransomware

Learn about best practices to combat the threat of ransomware.

A decentralized approach will allow users to take back ownership of their personal information, while protecting them from major breaches.

03 cryptography

Why aren't we using SHA-3?

The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.

Hooded man hacking computer with green binary background

Hacking is a booming business, and it’s time for a disruption

Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our...

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain
By

Hackers exploit Jenkins servers, make $3 million by mining Monero

Hackers exploiting Jenkins servers made $3 million in one of the biggest malicious cryptocurrency mining operations ever.

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

group chat services - Telegram
By

Hackers exploit zero-day flaw in Telegram to mine cryptocurrency

Kaspersky Lab researchers discovered a zero-day flaw in Telegram Messenger's desktop client that was exploited to mine cryptocurrency or to install a backdoor.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

2018 Winter Olympics – Opening ceremony – PyeongChang, South Korea – February 9, 2018
By

Winter Olympics hit with cyber attack during opening ceremony

Officials confirm that a cyber attack caused issues during the 2018 Winter Olympics opening ceremony in PyeongChang.

Load More