Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
October 25, 2016

Darknet Probing Tech Startup Ravelin Closes £3 Million Investment Round

It’s not easy tackling darknet fraudsters, but that’s exactly what London-based fraud detection tech startup Ravelin does. It’s also announced that it has closed a £3 million investment funding round as the business looks at expanding.

In the last nine months, Ravelin has grown their company revenue by more than 600 percent, attracting high-profile names, according to a report from Bdaily. Some companies that work with Ravelin include EasyTaxi and Deliveroo and investors Playfair Capital.

Martin Sweeney, Ravelin chief executive said to Bdaily that merchants, consumers, and banks face a growing problem with fraud.

He said:

Fraud is growing faster than [...]

Read More
October 24, 2016

Google Can Now Track You Online with its Updated Privacy Policy

Google has recently updated its privacy policy meaning that it can now track and identify individuals online via information from its DoubleClick ads, reports Betanews.

When Google initially acquired DoubleClick in 2007, the organization maintained that its user data was separate from ad tracking; however, the report finds that that’s no longer the case. Not only that, but while Google has not hidden the information from the public, they haven’t announced the change either.

It’s available for anyone to see, but if you don’t know the changes have been made, what is the likelihood that you will seek out the updated policy?

According to an archive of Google’s [...]

Read More
October 24, 2016

The Future of Digital Rights Management Might Be Decent with Blockchain

DECENT wants to create a decentralized digital rights management solution for piracy powered by the blockchain.

Like so many modern decentralized platforms, DECENT’s platform seeks to remove the middlemen, power abusers, and prevent third party manipulation to ensure content creators and consumers can trade material in a peer-to-peer, permissioned and transparent blockchain network.

“Our aim is to replace the status quo,” Matej Michalko, DECENT developer, tells Hacked.

A network of individual, digital dictatorships, with a digital democracy, re-routing power back to authors, artist, producers and those [...]

Read More
October 22, 2016

US Bank Uses Mobile Phones Geolocation to Prevent Fraud

The U.S. Bank has unveiled that it is attempting to stop fraud by using consumers’ mobile phones geolocation to determine if a consumer’s card information matches that of its phone, according to a report by American Banker.

Nowadays, it’s no longer possible to walk down the street without seeing someone on their phone. Nor is it possible to avoid the threat of fraud or identity theft, which targets people all over the world.

Now, though, in a bid to stop fraud the U.S. Bank has announced that it may have the solution to this: by utilizing a mobile phone’s geolocation by pinpointing exactly where a customer is and if it matches the location of their card.

The bank [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University