Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Energy
Most Recent
 
Read More
November 28, 2016

Generate Electricity and Digital Currency by Walking Over Street Tiles

Through the simple act of walking people can now produce their own electricity and digital currency in Washington D.C., as it embraces a form of renewable energy, according to Futurism.

Known as Pavegen Tiles, these street tiles convert kinetic energy from people’s steps into electricity, digital currency, and data with one person creating five watts of power from their footsteps.

However, it wasn’t an easy start for Laurence Kemball-Cook, who founded London-based Pavegen in 2009. As Futurism reports, Kembell-Cook said that at the start no one believed in what he was doing. As a result, and to prove his technology did work, he broke into a building site and forcibly [...]

66157
 
Read More
September 14, 2016

The UK is Home to World’s Largest Wind Turbine

The world’s largest wind turbine that is wider and taller than the London Eye has been installed in the Irish Sea.

27417
 
Read More
January 28, 2016

Ukraine Power Grid Hack, All May Not be What it Seems

Reports are coming out on The Register that challenge the current finger pointing by Ukraine’s SBU state security service implicating Russia as the protagonist behind hacks on western Ukraine’s utility companies. This is not the first twist in the December Ukrainian power utility hacking story covered by Hacked.

It all started shortly after the December attack. iSIGHT Partners, a global cyber threat intelligence company, reported that malicious code had affected at least three regional Ukrainian operators. The media, picking up on this, heralded the first known instance of malware causing a power outage.

The original suggestion that malware was the cause of [...]

24198
 
Read More
December 27, 2015

Blockchain Tech Hints At The Future of the Internet & Cybersecurity

Bitcoin, as the first successful blockchain implementation, is not an unprecedented breakthrough, but it is the first to be applied and adopted at a global rate. The blockchain technology comes from a history of cryptography and security research. The Merkle Tree and distributed hash tables, hit upon in the 1970s, meant autonomy, fault tolerance and scalability for distributed systems.  Bitcoin built upon this loose tradition. 

If it weren’t for those tools, the world would not have BitTorrent, Napster and Freenet, all of which are used in great deal by the modern web user. What Satoshi Nakamoto did first was combine these above-mentioned distributed communications systems and [...]

26307
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University