Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
November 12, 2015

FBI and Carnegie Mellon Possibly Colluded in Tor Uncloaking Scheme

Reports have come out recently that paint an interesting picture of the Federal Bureau of Investigation and Carnegie Mellon University. For starters, a court document acquired by Vice showed that the FBI was crediting an unnamed academic institution with helping it in locating a child pornography suspect as well as the people behind Silk Road 2.

Researchers from the school canceled a talk they were scheduled to give at July’s Black Hat conference on exactly the subject of unmasking a Tor IP address. The talk promised to show the conference of hackers how this could be done with a mere $3,000 equipment investment cost. The attack that was successful last year cost around [...]

Read More
November 12, 2015

Are SJWs Trying to Frame Linux Creator Linus Torvalds With Fake Sexual Assault Charges?

Last week open-source software developer and Libertarian activist Eric Raymond published a disturbing post that went viral on the Internet. The post, titled “From kafkatrap to honeytrap,” reports that militant feminist groups and “Social Justice Warriors” (SJWs) are trying to frame Linux kernel creator Linus Torvalds and other high-profile male developers with fake sexual assault charges.

Read More
October 30, 2015

Wall Street Journal Speculates that Android and Chrome OS Could Become One

A new report by the Wall Street Journal has tech journalists on a speculation bender regarding the possibility of Google merging its Android and Chrome OS platforms into one. According to the WSJ, it could be as early as next year.

The move would put Android developers on their toes, requiring a great deal of extra work to catch up with the changes. The two systems are fundamentally different though both are Unix-based. On the one hand, Android has applications installed locally, like a traditional desktop operating system except on mobile devices. On the other, Chrome is a cloud-based system which requires the Internet to run.

Even if the merger or “folding” took [...]

Read More
September 15, 2015

U.S. Holding Back on Cyber Sanctions against China before President Xi’s Visit

According to a U.S. official, there are no plans to impose sanctions on China by the United States ahead of Chinese President Xi Jinping’s visit next week.

A senior U.S. administration official with insider White House knowledge, who spoke on the condition of anonymity, confirmed there are no plans by the White House to impose sanctions on China over multiple cyber attacks targeting the U.S. economy and other related installations, reports The Washington Post.

The reason, according to the official is simple. Diplomacy.

The White House is supposedly keen to avoid any potential disagreements before a landmark visit by Chinese President Xi Jinping. Quite simply, any [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University