How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Most Recent
Read More
December 23, 2015

UK Acts To Keep Children Safe Online

In the UK, a new government directive requires all school strengthen measures to prevent children cyber-bullying, pornography and radicalization. The changes will mean children as young as 5 will receive online education about social media use and other issues online. 

The plans, created by Education Secretary Nicky Morgan and announced today, aim to prevent children from experiencing questionable materials online.

“Recent events have shown that the risks to young ‎people being targeted by radical groups have risen and should not be underestimated,” a UK government announcement read.

Schools will be required to apply filters and monitoring systems so children [...]

Read More
November 16, 2015

Hackers Must Eject the SJWs, Says Legendary Hacker Eric Raymond

In a post titled “Why Hackers Must Eject the SJWs,” legendary open-source software developer and Libertarian activist Eric Raymond, the author of “The Cathedral and the Bazaar,” warns that the hacker culture is under ideological attack from the so-called “Social Justice Warriors” (SWJs).

Read More
October 23, 2015

Boston University Researchers Identify Network Time Protocol (NTP) Vulnerabilities

Increasing distributed denial of service (DDoS) attacks on computer networks are gaining the attention of researchers. A group of Boston University (BU) researchers published a report this week that examines the risk that unauthenticated Network Time Protocol (NTP) networks face due to software implementation flaws. “Attacking the Network Time Protocol” by Aanchal Malhotra, Isaac E. Cohen, Erik Brakke and Sharon Goldberg of BU notes that NTP, one of the oldest Internet protocols, is prone to DDoS attacks.

Malhotra, a Ph.D. candidate, discovered security vulnerabilities in a network time protocol that were used to synchronize computer clocks, according to ThreatPost. These [...]

Read More
October 9, 2015

The Possibilities and the Future of Brain Hacking

For all of man’s scientific and technological advances, the human brain largely remains a mystery. A new Vimeo video, “Master/Mind,” examines the state of research on the human mind and the questions that scientists, ethicists, futurists and others are asking in light of what we’re learning about the mind. The video, a Vimeo Staff Pick, consists of a series of comments from scientists, technologist, futurists and ethicists.

Automation, robotics and artificial intelligence are developing so rapidly that many people are wondering if some day, man will no longer harness science but rather be controlled by it. As this question weighs heavily on peoples’ mind, [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University