Most Recent
 
Read More
August 24, 2016

New York Times: Russian Intelligence Hackers Targeted Us

In a report late Tuesday, the New York Times revealed that it’s Moscow bureau was the target of a cyberattack from Russian hackers, earlier this month.

Although details are currently scarce, the New York Times’s Moscow bureau was, according to the publication, the target of an attempted cyberattack this month.

A spokeswoman for The Times insisted that there was no evidence to show that the cyberattack was successful.

We are constantly monitoring our systems with the latest available intelligence and tools,” Eileen Murphy stated. She added, “We have seen no evidence that any of our internal systems, including our systems in the Moscow bureau, have been breached or [...]

99
 
Read More
August 23, 2016

800,000 Gamers’ Credentials at Risk after Epic Games Forums Breach

Usernames, passwords, email addresses, IP addresses, birthdates and even private messages and posts of over 800,000 Unreal Engine and Unreal Tournament forum accounts, following a breach of its developer and maker, Epic Games.

A massive breach affecting user accounts from Unreal Engine and Unreal Tournament forums sees over 808,000 accounts compromised, as a result of a breach targeting famed game developer Epic Games. The game-maker, popularly known for developing games such as Gears of War and Unreal Tournament among others, insisted that no passwords were compromised on its Unreal forums.

However, accounts active since July 2015 on older gaming forums including Gears [...]

137
 
Read More
August 22, 2016

Linux Flaw Puts 1.4 Billion Android Devices at Risk

A Linux flaw that allows an attacker to hijack a target’s internet traffic via a TCP connection exploit also impacts about 4 in 5 Android devices – nearly 1.4 billion Android devices – security researchers have discovered.

A previously discovered Linux flaw that allowed attackers to spy on secure communications without the use of traditional “man-in-the-middle” attacks has also been discovered to impact nearly 80% of all activated Android devices in the world.

The Linux Flaw, originally discovered by researchers from the US Army Research Laboratory and the University of California lets attackers obtain unencrypted traffic and degrade encrypted traffic to snoop in on [...]

538
 
Read More
August 19, 2016

Opinion: Bridging the Cybersecurity Gender Gap

In an opinion piece in the Christian Science Monitor, more needs to be done to attract more women to the cybersecurity fields.

According to the CSM, in 2015, a mere 25 percent of women held computing jobs while companies such as Twitter and Google have been widely criticized for not bridging the gender gap in the workforce.

Not only that, but a report from the Women’s Society of Cyberjutsu found that only 11 percent of jobs in the cybersecurity field were held by women.

Digital Privacy Ahead of its Game

When it comes to digital privacy, though, it has done much better compared to other fields.

Why?

Well, according to CSM, it’s [...]

438
 
Read More
August 18, 2016

British Whizz Kid Hacks Pokemon Go; Catches Monsters Without Breaking a Sweat

A 25-year-old British former computer science student has discovered a loophole in the popular Pokemon Go allowing him to catch Pokemon without leaving the comfort of his home.

According to reports, players of the game have resorted to donating thousands of pounds to keep Mark Gore’s ‘bot’ running. Five lawyers are alleged to have urged him to remove the programme.

Mr Gore has stated that his loophole wasn’t designed to take the fun out of the game, which is reported to have seen users harassed by police for walking into restricted areas, according to the British tabloid newspaper, the Sun.

He stated that it was easy exploiting the game, [...]

1147
Load More
End of the line!
Hacked.com
Hacked.com is a news & information site for the free internet.
Contributors
View our contributors here.
Tutorials
 
password typist
 
virtual private network (VPN)
 
Windows keyboard
 
stay anonymous
 
stagefright
Trending Topics
Cybersecurity
hacking
Software
Hacking
Vulnerabilities
Pokemon Go
Breaches