Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Cybersecurity
Hacking
ransomware
Bitcoin
Darknet
Vulnerabilities
visa
Blockchain
Most Recent
 
Read More
November 2, 2016

Zcash: A Cryptocurrency More Secure and Anonymous Than Bitcoin?

When MT Gox, bitcoin’s biggest exchange at the time, suddenly announced during February 2014 that they had “lost” almost $1 billion worth of bitcoins, some took to the blockchain to see what had happened. Their analysis led, in just a few days, to the second biggest news of that year: MT Gox still held 200,000 bitcoins, then worth $200 million, they appeared to be hiding.

Initially, there was some public debate with Gregory Maxwell, a bitcoin developer, disputing the findings, but all was confirmed when MT Gox publicly stated they had forgotten about $200 million.

The event revealed what is now widely accepted: Bitcoin provides very little privacy. All transactions are [...]

255305
 
Read More
November 2, 2016

vDice.io, The World’s First Full Decentralized Gambling Platform

vDice.io, having launched in June as the first fully-decentralized betting game for the first programmable P2P network, will host a crowdsale from November 15 to December 15. In exchange for Ether (ETH), investors will receive “vSlice” tokens, each of which is directly tied to the profits of the game. The “vSlice” token will regularly distribute profits of the vDice game to token holders.

Since going live on June 13, vDice has become the top ranked Google site for Ethereum gambling, having processed nearly 10,000 bets.

Built On Smart Contracts

Built on fully decentralized smart contracts, vDice processes bets through an Oracle without server architecture. As [...]

53613
 
Read More
October 24, 2016

The Future of Digital Rights Management Might Be Decent with Blockchain

DECENT wants to create a decentralized digital rights management solution for piracy powered by the blockchain.

Like so many modern decentralized platforms, DECENT’s platform seeks to remove the middlemen, power abusers, and prevent third party manipulation to ensure content creators and consumers can trade material in a peer-to-peer, permissioned and transparent blockchain network.

“Our aim is to replace the status quo,” Matej Michalko, DECENT developer, tells Hacked.

A network of individual, digital dictatorships, with a digital democracy, re-routing power back to authors, artist, producers and those [...]

67489
 
Read More
October 22, 2016

Is a Decentralized Internet the Solution to Outages?

“Attacks that we witnessed today were possible mainly because there is a centralized infrastructure which could have been targeted,” said Piotr Janiuk, CTO of  Golem,  which seeks to decentralize the internet using peer-to-peer technology. “The attack itself isn’t easy to carry out, but it is obvious that even the backbone infrastructure behind the Internet contains single points of failure which are prone to such malicious activity – even though the infrastructure may comprise multiple machines. As of today, the trend is to move towards distributed solutions and the main problem is the lack of standard way of setting up the infrastructure.”

Golem  is among a [...]

330785
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University