Most Recent
 
Read More
August 23, 2016

800,000 Gamers’ Credentials at Risk after Epic Games Forums Breach

Usernames, passwords, email addresses, IP addresses, birthdates and even private messages and posts of over 800,000 Unreal Engine and Unreal Tournament forum accounts, following a breach of its developer and maker, Epic Games.

A massive breach affecting user accounts from Unreal Engine and Unreal Tournament forums sees over 808,000 accounts compromised, as a result of a breach targeting famed game developer Epic Games. The game-maker, popularly known for developing games such as Gears of War and Unreal Tournament among others, insisted that no passwords were compromised on its Unreal forums.

However, accounts active since July 2015 on older gaming forums including Gears [...]

113
 
Read More
August 22, 2016

Linux Flaw Puts 1.4 Billion Android Devices at Risk

A Linux flaw that allows an attacker to hijack a target’s internet traffic via a TCP connection exploit also impacts about 4 in 5 Android devices – nearly 1.4 billion Android devices – security researchers have discovered.

A previously discovered Linux flaw that allowed attackers to spy on secure communications without the use of traditional “man-in-the-middle” attacks has also been discovered to impact nearly 80% of all activated Android devices in the world.

The Linux Flaw, originally discovered by researchers from the US Army Research Laboratory and the University of California lets attackers obtain unencrypted traffic and degrade encrypted traffic to snoop in on [...]

290
 
Read More
August 19, 2016

Opinion: Bridging the Cybersecurity Gender Gap

In an opinion piece in the Christian Science Monitor, more needs to be done to attract more women to the cybersecurity fields.

According to the CSM, in 2015, a mere 25 percent of women held computing jobs while companies such as Twitter and Google have been widely criticized for not bridging the gender gap in the workforce.

Not only that, but a report from the Women’s Society of Cyberjutsu found that only 11 percent of jobs in the cybersecurity field were held by women.

Digital Privacy Ahead of its Game

When it comes to digital privacy, though, it has done much better compared to other fields.

Why?

Well, according to CSM, it’s [...]

399
 
Read More
August 18, 2016

British Whizz Kid Hacks Pokemon Go; Catches Monsters Without Breaking a Sweat

A 25-year-old British former computer science student has discovered a loophole in the popular Pokemon Go allowing him to catch Pokemon without leaving the comfort of his home.

According to reports, players of the game have resorted to donating thousands of pounds to keep Mark Gore’s ‘bot’ running. Five lawyers are alleged to have urged him to remove the programme.

Mr Gore has stated that his loophole wasn’t designed to take the fun out of the game, which is reported to have seen users harassed by police for walking into restricted areas, according to the British tabloid newspaper, the Sun.

He stated that it was easy exploiting the game, [...]

1042
 
Read More
August 16, 2016

Shadow Brokers Hacking Group Claim to Have NSA Hacking Tools for Sale

A hacking group by the name of Shadow Brokers is claiming that it has National Security Agency hacking tools for sale.

In an Internet posting, the group said that they have a ‘full sponsor state tool set’ of cyberweapons, which the group claim belongs to the Equation Group, which is believed to be an NSA affiliate, according to a news report from RT. In a bid to back up their statement they posted what appears to be sample attack code.

Shadow Brokers are offering to sell the complete set of tools to the highest bidder. They are seeking to raise 1,000,000 bitcoins, worth around $568 million USD.

While there are bound to be some who may doubt the group [...]

871
Load More
End of the line!
Hacked.com
Hacked.com is a news & information site for the free internet.
Contributors
View our contributors here.
Tutorials
 
password typist
 
virtual private network (VPN)
 
Windows keyboard
 
stay anonymous
 
stagefright
Trending Topics
Cybersecurity
Communication
whistleblower
hacking
Hacking
Software
Vulnerabilities