Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Most Recent
 
Read More
December 22, 2016

15 of the Best WordPress Plugins to Keep Your Site Secure

 Being the most popular blogging platform worldwide, it’s only natural that WordPress would have a user base in the millions. However, in today’s world, popularity is a double-edged sword – the more popular a particular website is, the higher the chances of spammers and hackers attacking it. Unlike other online platforms for blog, it could be a problem for WordPress and though it’s got strong security features, nothing’s set in stone. Thus, your priority should be to ascertain the safety of your blog and deter hackers from stealing and altering your private information. You wouldn’t want all your effort to go to waste, would you?

Take a look at the top 15 WordPress plugins [...]

112333
 
Read More
December 20, 2016

1 Billion Users’ Data from Yahoo Breach up for Sale on the Dark Web

In September, Yahoo announced it had been hacked, and that data from 500 million users had been compromised. A few days ago, the company announced it was hacked a second time, this time with 1 billion users’ data being compromised. Both attacks occurred back in 2013, and hacked data has reportedly been for sale on the dark web.

News about the attacks came to light after Yahoo struck a deal with telecom giant Verizon, in which the internet giants’ core business would be sold to the telecommunications company for $4.83 billion. The sale is now in jeopardy.

According to Andrew Komarov, Chief Intelligence Officer at cybersecurity firm InfoArmor, all of the hacked data [...]

91243
 
Read More
December 14, 2016

Popcorn TIme Ransomware Pardons Victims, If They Infect 2 Other Victims

Ransomware has been around for a while, and it’s a pretty nasty thing as it encrypts users’ files and forces them to pay. Now, a group of hackers, allegedly from Syria, have create a new type that gives victims a choice: they either pay up, or they infect two new users to have access to their files again.

This new type of ransomware, named Popcorn Time (unrelated to the Popcorn Time software you use to watch movies), is different from the type that hit the San Francisco Metro System last month. It forces users to either pay 1 Bitcoin, or to send their friends a link that will infect them with the ransomware. If the victim’s friends pay up, then the victim gains access to its [...]

59718
 
Read More
December 12, 2016

Is This Blockchain Voting System by NYU Devs the Solution to Russia Election Meddling?

With lingering concerns over ways in which the 2016 election could have been underhandedly swayed in the favor of President-elect Donald J. Trump after Barack Obama requested a report on the matter, a team of blockchain-minded New York University devs have developed a potential answer after winning first prize in a development challenge.

Cybersecurity has been a major issue in elections ever since electronic voting machines were deployed in the early 1990s.

Voting had never been less expensive and easier for the electorate. The rise of cybersecurity, on the other hand, has become a major issue for the underpinnings of Democracy.

It has [...]

176052
 
Read More
December 9, 2016

This Tool Lets you Scan the Dark Web for your (Stolen) Personal Data

A recently revealed a dark web scanning service was launched in the UK. The service is called OwlDetect and is available for £3,5 a month. It allows users to scan the dark web in search for their own leaked information. This includes email addresses, credit card information and bank details.

The service reportedly uses online programs and a team of trained experts to scan hundreds of thousands of dark web websites in order to look for their customers’ data. If any personal data is found, the company helps its users act in order to keep themselves safe. It was launched in an attempt to remove reliance on big companies, as users usually only know they were hacked after these [...]

254860
Load More
End of the line!