Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategoryCybersecurity
Featured

Bitcoin

Digital Fraud & How to protect Yourself: From ICOs to Bitcoin Scams

Posted on June 17th, 2017.

Digital fraud continues to grow apace. More worryingly, the increasing variety and sophistication of the scams themselves has seen the number of people falling victim to scams growing just as fast. And we are no longer just talking about standard phishing. Today’s digital criminals are highly developed and extremely quick to jump on the...

Featured

Bitcoin

Global Malware Campaign WannaCry is Affecting Bitcoin’s Price

Posted on May 13th, 2017.

As CCN earlier reported, WannaCry has infected more than 36 000 computers. Users of affected machines are prompted with the following screen: The malware WannaCry automatically encrypts files on the computer and demands the user to send $300 in bitcoin to a particular bitcoin address. 36,000 detections of #WannaCry (aka #WanaCypt0r aka...

Featured

Cybersecurity

TokenCard ICO Bug: End of the Road for TokenCard?

Posted on May 7th, 2017.

A Hacked member writes: Love your service. I was wondering what you thought of the tokencard bug and if you think it will negatively affect the project and it’s token value? We at Hacked did not previously cover the TokenCard ICO. Looking into it, we have less-than-positive news to report. The TokenCard team seems to be taking the...

Featured

Articles

Google’s AI Became Highly Aggressive, Could Have Major Financial Implications

Posted on March 30th, 2017.

Famed physicist Stephen Hawking has warned us that the continued advancement of artificial intelligence might not be as good as we’d like it to. According to him: “[The creation of artificial intelligence] will either be the best, or the worst thing, ever to happen to humanity”. In its list of ways the world could end, LiveScience adds...

Featured

Articles

Securing Bitcoin: How to Use a Paper Wallet

Posted on March 24th, 2017.

If you’re planning to hold bitcoins long term, one of the easiest, best ways to store them is in paper wallets, somewhere safe, such as a safe for instance, that you have control over. More technological methods such as the Trezor hardware wallet and others have come about, and we are hoping to acquire one of those for review purposes...

Featured

Cybersecurity

61% were compromised by ransomware in 2016. Here’s how to stay safe

Posted on March 13th, 2017.

According to the CyberEdge Group’s 2017 Cyberthreat Defense Report, a whopping 61% of organizations was compromised by a ransomware attack in 2016. Of those infected, over one-third of companies decided to pay extortionists to regain access to their data. Refusal was risky: even though 54% of those who refused to pay regained access to...

Featured

Cybersecurity

5 Best VPN for Torrenting that Guarantee You True Anonymity

Posted on February 14th, 2017.

Heard the news about several people across the globe getting legal notices from HBO over suspicions of downloading pirated version of Game of Thrones episodes? Well, this truly captures the essence of why people are looking for guaranteed anonymous VPN torrents services that help them use torrents and P2P networks for file sharing like...

Featured

Cybersecurity

15 of the Best WordPress Plugins to Keep Your Site Secure

Posted on December 22nd, 2016.

 Being the most popular blogging platform worldwide, it’s only natural that WordPress would have a user base in the millions. However, in today’s world, popularity is a double-edged sword – the more popular a particular website is, the higher the chances of spammers and hackers attacking it. Unlike other online platforms for blog, it...

Featured

Breaches

1 Billion Users’ Data from Yahoo Breach up for Sale on the Dark Web

Posted on December 20th, 2016.

In September, Yahoo announced it had been hacked, and that data from 500 million users had been compromised. A few days ago, the company announced it was hacked a second time, this time with 1 billion users’ data being compromised. Both attacks occurred back in 2013, and hacked data has reportedly been for sale on the dark web....

Featured

Cybersecurity

Popcorn TIme Ransomware Pardons Victims, If They Infect 2 Other Victims

Posted on December 14th, 2016.

Ransomware has been around for a while, and it’s a pretty nasty thing as it encrypts users’ files and forces them to pay. Now, a group of hackers, allegedly from Syria, have create a new type that gives victims a choice: they either pay up, or they infect two new users to have access to their files again. This new type of ransomware,...

Featured

Bitcoin

Is This Blockchain Voting System by NYU Devs the Solution to Russia Election Meddling?

Posted on December 12th, 2016.

With lingering concerns over ways in which the 2016 election could have been underhandedly swayed in the favor of President-elect Donald J. Trump after Barack Obama requested a report on the matter, a team of blockchain-minded New York University devs have developed a potential answer after winning first prize in a development challenge....

Featured

Cybersecurity

This Tool Lets you Scan the Dark Web for your (Stolen) Personal Data

Posted on December 9th, 2016.

A recently revealed a dark web scanning service was launched in the UK. The service is called OwlDetect and is available for £3,5 a month. It allows users to scan the dark web in search for their own leaked information. This includes email addresses, credit card information and bank details. The service reportedly uses online programs...

Featured

Cybersecurity

The Department of Defense Is about to Enhance Its Deep Web Search Engine

Posted on December 6th, 2016.

A lot of people have never heard of Memex. Memex is a deep web search engine developed by DARPA (Defense Advanced Research Projects Agency), the agency that created the ARPANET, which served as a basis of the internet we use nowadays. Memex is a deep web search engine that doesn’t quite work like Google or Bing. DARPA sees Memex as a set...

Featured

Hacking

Hackers Only Need Seconds to Figure Out Card Details

Posted on December 3rd, 2016.

Experts from Newcastle University in England has found that hackers only need six seconds to figure out the card number, expiry date, and security code for a Visa debit or credit card by simple guesswork, according to a report from The Telegraph. According to figures from the Office of National Statistics, in the U.K. the number of bank...

Featured

Cybersecurity

BoE asks FinTech Firms to Help Warn Banks About Cyberattacks

Posted on December 1st, 2016.

The Bank of England is recruiting FinTech companies to help prevent cyberattacks targeting financial institutions, according to a report from The Telegraph. Earlier this year, the Depository Trust & Clearing Corporation (DTCC) conducted a survey, which found that cyber risks topped the list of financial service concerns. According to...

Featured

Cybersecurity

Hackers Compromise Israeli TV Channels With “Divine Retribution” Message

Posted on December 1st, 2016.

Israel has recently been swept by a wave of, reportedly, over 250 large fires, which led to dozens of arrests on suspicion of arson. Tuesday night, hackers compromised two major Israeli news channels, unexpectedly interrupting the broadcast. The hackers then showed images of Muslim holy cities and suggested the recent wave of fires was...

Featured

Bitcoin

A Familiar Tale as Bitcoin Extortionists Target German Bank’s Customers

Posted on November 29th, 2016.

Bitcoin extortionists have hacked a high-end European bank several days ago, and now blackmailing its customers. Valartis, a Chinese-owned bank in Lichtenstein, has reportedly been hacked by unknown extortionists, according to the German newspaper Bild am Sonntag. The hackers are demanding Valartis’ customers 10% of their life savings,...

Featured

Bitcoin

San Francisco Metro System Blackmailed for 100 Bitcoins by Ransomware Extortionists

Posted on November 28th, 2016.

On the 26th of November, the San Francisco Examiner reported the San Francisco Municipal Transportation Agency (SFMTA) was hacked. Infected computers at Muni stations were reportedly downed by HDDCryptor ransomware, whose masters attempted to extort the station for bitcoin. As a result, passengers got a free ride throughout the weekend...

Featured

Vulnerabilities

New Form of Ransomware Uses Social Media to Customize Demands

Posted on November 27th, 2016.

A new form of ransomware is reported to have been found that uses a person’s social media and computer files to customize a demand, according to cybersecurity researchers at Proofpoint. Called ‘Ransoc’ by the researchers because of its connection to social media, they found that the malware was scanning local media filenames and running...

Featured

Cybersecurity

Israeli Researchers Turn Speakers/Headphones Into Eavesdropping Microphones

Posted on November 24th, 2016.

In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard....