Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Cybersecurity
Hacking
ransomware
Bitcoin
Darknet
Vulnerabilities
visa
Decentralization
Most Recent
 
Read More
October 27, 2016

Shock Wave on the Ice: The Pirate Party Could Win Iceland’s National Elections Next Saturday, Grab Power

The Pirate Party of Iceland, founded in 2012 to champion direct democracy and internet freedom, is projected to win Saturday’s general election and could end up leading Iceland’s next government, The Wall Street Journal reports.

57054
 
Read More
October 10, 2016

This Anonymous Cryptocurrency Has Privacy Advocates Talking

Monero is an anonymous crypto-currency known for being preferred by dark net’s largest marketplaces, where drugs and illicit goods are sold. Darknet marketplaces were made popular by Ross Ulbricht’s Silk Road, which landed him a lifetime in prison.

The newest cryptocurrency craze preys upon modern privacy concerns. It cites how big banks, corporations, and governments keep tabs on everything in the marketing materials. This is very much similar to Bitcoin’s early marketing. Unlike Bitcoin, which has a 21 million market cap, Monero has none. It was forked from Bytecoin.

“There is no safe place to conduct private transactions,” a marketing video for the crypto-currency [...]

335778
 
Read More
September 12, 2016

Toward Unbreakable Quantum Encryption for Everyone

Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

226551
 
Read More
December 27, 2015

Blockchain Tech Hints At The Future of the Internet & Cybersecurity

Bitcoin, as the first successful blockchain implementation, is not an unprecedented breakthrough, but it is the first to be applied and adopted at a global rate. The blockchain technology comes from a history of cryptography and security research. The Merkle Tree and distributed hash tables, hit upon in the 1970s, meant autonomy, fault tolerance and scalability for distributed systems.  Bitcoin built upon this loose tradition. 

If it weren’t for those tools, the world would not have BitTorrent, Napster and Freenet, all of which are used in great deal by the modern web user. What Satoshi Nakamoto did first was combine these above-mentioned distributed communications systems and [...]

23532
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University