Jonas Borchgrevink
-
Hong Kong Netizens Protest Internet Freedom Bill
In December 2015, Hong Kong citizens took to the streets in protest of a controversial bill, dubbed Internet Article 23, that many believed would infringe on internet freedoms and free speech. The protests, which began just before Christmas and continued into the New Year, centered around concerns that the proposed copyright legislation could have far-reaching…
-
Will AI Replace Lawyers by 2030? The Future of Legal Practice
Back in 2015, Jomati Consultants LLP, a prominent British legal consulting firm, stirred debate by predicting that artificial intelligence (AI) and robotics could potentially replace a significant portion of legal work by 2030. The report, titled “Civilisation 2030: The Near Future for Law Firms,” forecasted that AI would revolutionize the legal industry, transforming the traditional…
-
Nuclear Scientist’s 2015 Spear-Phishing Plot: A Key Moment in US Cybersecurity History
First published: February 5, 2016, Updated for 2024.Charles Harvey Eccleston, a 62-year-old former U.S. government scientist, pled guilty in 2016 to orchestrating a spear-phishing cyberattack targeting employees of the U.S. Department of Energy (DOE). His plot, which was designed to compromise sensitive information relating to the U.S. nuclear weapons program, represented a serious breach of…
-
Reflecting on the 2015 Bundestag Cyberattack by Russia
Nearly a decade has passed since the 2015 cyberattack on the German Bundestag, a pivotal moment in global cybersecurity history. In retrospect, the attack, orchestrated by Russian state-sponsored hackers, marked a significant escalation in the use of cyber operations as a tool for both espionage and sabotage. The 2015 Bundestag Attack: A Turning Point In…
-
WhatsApp Web Vulnerability: How It Was Fixed
In 2015, a critical vulnerability in WhatsApp Web, the browser-based version of the popular messaging app, put millions of users at risk. Discovered by Check Point researchers, this flaw could have allowed hackers to infect users’ computers with malware through simple contact cards. The incident highlighted the importance of robust security practices for web-based services.…
-
How to Recover a Hacked or Disabled Instagram Account
If your Instagram account has been hacked or you’ve lost access, don’t panic. Follow these essential steps to recover and secure your account efficiently. Stay Calm and Avoid Common Mistakes In moments of stress, it’s easy to make mistakes that could hinder your chances of recovery. Here are the top mistakes to avoid: 5 Mistakes…
-
How We Protect Our Employees with Cyber Awareness
As the CEO of Hacked.com, my primary responsibility is ensuring the safety of both our employees, our clients, and our business Hacked.com. Today, the lines between personal and business activities are more blurred than ever before. This makes cyber awareness critical, not just for protecting our clients but also for safeguarding our own team. Here’s…
-
How to Recover a Facebook Business Page
Has your Facebook Business Page or Business Manager been compromised by a hacker or a disgruntled employee? We know how stressful and frustrating it can be to lose control of your online presence. The good news is that recovery is possible. Below are some scenarios that could help guide you in reclaiming your Facebook page.…
-
How to recover a hacked or lost Facebook account
Losing access to your Facebook account is a distressing experience. To help you regain control, we at Hacked.com have compiled a comprehensive guide following our best practices on how to recover a hacked Facebook account. While we can’t cover every possible scenario in this article, we aim to provide the best guidance possible. If you…
-
How to Report a Hacker & Contact Authorities
Hackers and cybercriminals are becoming increasingly sophisticated, posing significant threats to individuals and organizations. Fortunately, avenues are available to report these malicious activities and protect oneself from further harm. This article provides a comprehensive guide on how to report a hacker, where to file police reports or legal reports, and the importance of being vigilant…
-
Been hacked? Take These Steps Immediately
If you notice your password has been changed or receive suspicious login alerts, your account may be at risk of being hacked. If you cannot recover and secure it, follow the steps outlined below immediately. Notify Friends, Family, and Other Connections or Followers Inform your contacts that your account has been hacked to prevent them…
-
How AI Will Cause Havoc with TAIA
Artificial Intelligence (AI) will be damaging to businesses and countries. Not because they pose an immediate threat as an AGI (Artificial General Intelligence), which is a different story altogether, but because of the vast possibilities to fool an audience. Within a few years, we will not be able to tell the difference between what has…
-
Artificial General Intelligence is Upon Us, and it’s Time to Prepare
Sam Altman, the past and current CEO of OpenAI, might have hidden results about a secret project named Q* (Q-star) for the previous board. As noted by The Information: OpenAI Made an AI Breakthrough Before Altman Firing, Stoking Excitement and Concern Source. This seems to be one of the likely reasons why the board fired…
-
How to Enable Automatic App Updates on iPhone
This video teaches you how to enable automatic app updates on your iPhone. This has saved me a lot of time and has increased my phone security. Multiple apps tend to send out critical security patches once they are discovered, but it’s hard to be quick enough to install those updates yourself. If you don’t…
-
How to Check if Your Phone is Hacked
Do you think your phone has been hacked? Look for signs of a hacked iPhone or Android like those listed below. Signs of a compromised smartphone What should you do if you think your phone is hacked? Preventative Strategies: Staying Ahead of Hackers Proactive measures are your best defense against malware and hackers. Regular updates,…