Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
October 24, 2016

The Future of Digital Rights Management Might Be Decent with Blockchain

DECENT wants to create a decentralized digital rights management solution for piracy powered by the blockchain.

Like so many modern decentralized platforms, DECENT’s platform seeks to remove the middlemen, power abusers, and prevent third party manipulation to ensure content creators and consumers can trade material in a peer-to-peer, permissioned and transparent blockchain network.

“Our aim is to replace the status quo,” Matej Michalko, DECENT developer, tells Hacked.

A network of individual, digital dictatorships, with a digital democracy, re-routing power back to authors, artist, producers and those [...]

Read More
September 28, 2016

Anonymous India: Mobile Network Reliance Jio is Sharing Call Data with Advertisers

The hacking group Anonymous is accusing the telecom network, Reliance Jio, of sharing its call data with advertisers in the U.S. and Singapore.

In a recent blog post, Anonymous India exposes how Reliance Jio has been sharing customers’ call data with foreign companies. Anonymous India also provide steps to see how Reliance Jio are sharing the data.

It said:

A year ago we had posted about how Reliance Jio was sharing user location data with China. One year on and nothing has changed.

In the blog post, Anonymous India claims that data from Reliance Jio’s My Jio and Jio Dialer apps are being sent to an advertiser called Mad.Me. It further adds that Reliance [...]

Read More
September 25, 2016

This UK Startup Sells Drones For Bitcoins

The Daedalus Group, a team of expert drone operators in North East of England, specializes in Aerial Surveying with footage taken via drones.

“We have worked in situations that demand secrecy and we are willing to offer our clients the opportunity to pay with a certain level of privacy,” said Charles Holmes, Director of Business Development, in interview with Hacked.

“However, due to CAA regulations our Flight Operations are transparent and we go beyond the level required in terms of notifications to local governing bodies.” Why Bitcoin? The company’s banking experience will be familiar to Bitcoin entrepreneurs.

“When we first began this adventure of [...]

Read More
September 15, 2016

Beware Uber Drivers! The Robot Cars Are Coming

Uber announced that that the world’s first self-driving Uber cars are on the road in Pittsburgh, the Steel City. The road ahead is still long, but the implications are staggering.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University