Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
October 24, 2016

The Future of Digital Rights Management Might Be Decent with Blockchain

DECENT wants to create a decentralized digital rights management solution for piracy powered by the blockchain.

Like so many modern decentralized platforms, DECENT’s platform seeks to remove the middlemen, power abusers, and prevent third party manipulation to ensure content creators and consumers can trade material in a peer-to-peer, permissioned and transparent blockchain network.

“Our aim is to replace the status quo,” Matej Michalko, DECENT developer, tells Hacked.

A network of individual, digital dictatorships, with a digital democracy, re-routing power back to authors, artist, producers and those [...]

Read More
October 22, 2016

Is a Decentralized Internet the Solution to Outages?

“Attacks that we witnessed today were possible mainly because there is a centralized infrastructure which could have been targeted,” said Piotr Janiuk, CTO of  Golem,  which seeks to decentralize the internet using peer-to-peer technology. “The attack itself isn’t easy to carry out, but it is obvious that even the backbone infrastructure behind the Internet contains single points of failure which are prone to such malicious activity – even though the infrastructure may comprise multiple machines. As of today, the trend is to move towards distributed solutions and the main problem is the lack of standard way of setting up the infrastructure.”

Golem  is among a [...]

Read More
October 21, 2016

Breathe Easy Bitcoiners, Quantum Computing No Match For Sha-2 Encryption

Worried about security for your bitcoin in the face of quantum computing? According to computer researchers, there’s no reason to be.

Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future.

Matthew Amy from Canada’s University of Waterloo proposes just this in a paper by the International Association of Cryptologic Research.

Amy, and researchers from Perimeter Institute for Theoretical Physics and the Canadian Institute for [...]

Read More
October 20, 2016

Metals Wants to Solve Payments for the Unbanked with the Bitcoin Blockchain

Editor’s note: Headline altered to reflect Metal’s endeavor to bring payments for the unbanked via the bitcoin blockchain.

Hacked discussed with Marshall Hayner the evolution of his startup, called Trees. Once focused on  delivering marijuana by drone – a la Snoop Dogg’s big music via drone push – the service has since been put on hold as Hayner develops Metal, a consumer-friendly approach to melding the world of high-risk payments, rewards and blockchain technology.

What’s on the agenda for Metal in the coming months?

MH: We will be unveiling our payment processing platform, which uses blockchain technology to solve a lot of problems in [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University