Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
September 14, 2016

The UK is Home to World’s Largest Wind Turbine

The world’s largest wind turbine that is wider and taller than the London Eye has been installed in the Irish Sea.

Read More
January 28, 2016

Ukraine Power Grid Hack, All May Not be What it Seems

Reports are coming out on The Register that challenge the current finger pointing by Ukraine’s SBU state security service implicating Russia as the protagonist behind hacks on western Ukraine’s utility companies. This is not the first twist in the December Ukrainian power utility hacking story covered by Hacked.

It all started shortly after the December attack. iSIGHT Partners, a global cyber threat intelligence company, reported that malicious code had affected at least three regional Ukrainian operators. The media, picking up on this, heralded the first known instance of malware causing a power outage.

The original suggestion that malware was the cause of [...]

Read More
December 27, 2015

Blockchain Tech Hints At The Future of the Internet & Cybersecurity

Bitcoin, as the first successful blockchain implementation, is not an unprecedented breakthrough, but it is the first to be applied and adopted at a global rate. The blockchain technology comes from a history of cryptography and security research. The Merkle Tree and distributed hash tables, hit upon in the 1970s, meant autonomy, fault tolerance and scalability for distributed systems.  Bitcoin built upon this loose tradition. 

If it weren’t for those tools, the world would not have BitTorrent, Napster and Freenet, all of which are used in great deal by the modern web user. What Satoshi Nakamoto did first was combine these above-mentioned distributed communications systems and [...]

Read More
December 21, 2015

Study: U.S. Power Grid Is Vulnerable to State-Sponsored Hackers

All networks, equipment, and computers can be hacked. A smart coffee maker can be hacked. So too, can a power station that figures in the grid of an entire country. Are such threats overstated? Or, is there a genuine reason to be concerned?

Here’s the good news first. Malicious attackers haven’t pulled the plug to switch off the power from their remote locations. The bad news? It may be entirely possible that a group of ill-intending hackers may have gained the necessary blueprints and knowledge to do just that, after an investigation by the Associated Press revealed that cyber-attackers have systematically carved a hole to gain access to critical operation networks. These [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University