Eavesdropping Archives | Hacked: Hacking Finance
user

Hacked: Hacking Finance


Archives


Navigation
CategoryEavesdropping
Featured

Cybersecurity

Israeli Researchers Turn Speakers/Headphones Into Eavesdropping Microphones

Posted on November 24th, 2016.

In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard....

Featured

Cyberespionage

Apple Watches Banned from UK Cabinet Meetings for Hacking Fears

Posted on November 10th, 2016.

Cabinet ministers have voiced concerns that Apple Watches could be hacked by Russian spies, prompting the devices to be barred from meetings, according to a report from The Telegraph. Under the new leadership of Theresa May, U.K cabinet ministers have been barred from wearing the watch during meetings after concerns were raised that the...

Featured

Cybersecurity

In Child Porn Bust, FBI May Have Used Malware on Innocent Users

Posted on November 8th, 2016.

In 2013, the FBI confiscated Freedom Hosting, a service that hosted websites on the dark web, including several child pornography websites and private email service TorMail. When it happened, it was seen as a massive victory, but recently unsealed documents show the FBI may have used malware on innocent users. Three years ago, the FBI...

Featured

Eavesdropping

Are Children Losing Their Childhood to Smart Toys?

Posted on October 27th, 2016.

Smart toys are on the rise, but while they may have the ability to enhance a child’s play, do they also pose a threat by spying on what children are doing? In an article from the New Scientist, the issue of privacy is looked into. More specifically, the privacy of children. Nowadays, it seems it’s no longer a case of simply playing with...

Featured

Cybersecurity

How Secure is Our Privacy on Messaging Apps?

Posted on October 17th, 2016.

For many of us our phones are our lifeline, but with the numerous phones apps that we use on a daily basis, how secure is our the privacy with our conversations? In the digital age we live in we are consumed by the countless apps we have on our phone. For many, they are the perfect way of keeping in touch with friends and family far and...

Featured

Cybersecurity

Snowden Leak Exposes UK Government’s Citizen Spying, Links to GCHQ

Posted on October 17th, 2016.

In a classified document leaked by NSA whistleblower Edward Snowden five of the U.K.’s ‘intercepting law enforcement agencies’ have accessed millions of U.K. citizens phone records and Internet activity. Dated March 9, 2011, the leaked document, published by The Intercept, identifies the MI5, the National Crime Agency previously known as...

Featured

Communication

San Bernadino iPhone Case: Major Press Agencies Are Suing the FBI

Posted on September 19th, 2016.

The Associated Press, Gannett, and VICE Media are suing the FBI to know more details about the agency’s hack of the San Bernadino killer’s iPhone.

Featured

Cyberespionage

Hong Kong Targeted by ‘Politically-Motivated” Chinese Hackers

Posted on September 5th, 2016.

During the lead-up to the recent legislative elections in Hong Kong, two government agencies in the country had been targeted by cyberespionage agents from China in a politically-motivated attack during August, a cybersecurity firm stated.

Featured

Cybersecurity

Russian President Putin: DNC Hack? Wasn’t Us.

Posted on September 2nd, 2016.

In a telling interview that covered a broad list of topics before the upcoming G20 gathering in China, Russian President Vladimir Putin has swept aside all accusations of Russia’s alleged involvement in the high-profile hacks targeting the U.S. Democratic party.

Featured

Cybersecurity

New York Times: Russian Intelligence Hackers Targeted Us

Posted on August 24th, 2016.

In a report late Tuesday, the New York Times revealed that it’s Moscow bureau was the target of a cyberattack from Russian hackers, earlier this month. Although details are currently scarce, the New York Times’s Moscow bureau was, according to the publication, the target of an attempted cyberattack this month. A spokeswoman for The Times...

Featured

Communication

Linux Flaw Puts 1.4 Billion Android Devices at Risk

Posted on August 22nd, 2016.

A Linux flaw that allows an attacker to hijack a target’s internet traffic via a TCP connection exploit also impacts about 4 in 5 Android devices – nearly 1.4 billion Android devices – security researchers have discovered. A previously discovered Linux flaw that allowed attackers to spy on secure communications without the use of...

Featured

Eavesdropping

Hillary Clinton Campaign Official: Email Leak a Russian Ploy to Help Trump

Posted on July 25th, 2016.

In an interview on Sunday, Hillary Clinton campaign manager Robby Mook opined that Russian state-sponsored hackers may have hacked the Democratic Party’s network and email system in order to help Republican presidential nominee Donald Trump. A top Hillary Clinton official has made the stunning claim that Russian state-sponsored hackers...

Featured

Breaches

Democrats’ Data (Dirt) on Donald Trump Stolen by Hackers

Posted on June 15th, 2016.

Democratic National Committee (DNC) officials have revealed that Russian state-sponsored hackers have compromised and stolen information from a DNC database containing research on Republican presidential candidate Donald Trump. DNC officials and cybersecurity experts from industry firm CrowdStrike have said that Russian hackers have...

Featured

Cybersecurity

Cybersecurity Is the New Atom Bomb, Says Apple Co-Founder

Posted on April 20th, 2016.

In an interview on Australian TV news show Lateline, Apple co-founder Steve Wozniak stated that cybersecurity is the greatest threat known to man since the atom bomb, one which is getting “worse and worse year by year.” Steve Wozniak, the man who co-founded Apple with Steve Jobs back in the early 1970s has stated that cybersecurity is...

Featured

Cybersecurity

Apple Vice President: FBI Backdoor Request Will Cause Hacker Havoc

Posted on March 7th, 2016.

Apple’s chief software engineer and vice president, Craig Federighi has, in an op-ed in the Washington Post, echoed Apple CEO Tim Cook’s take on the fierce encryption backdoor debate between the FBI and Apple. The chief software engineer at Apple and senior vice president of software engineering at the company, Craig Federighi has spoken...

Featured

Cybersecurity

Bill Gates Backs FBI Demand for Apple iPhone Backdoor

Posted on February 23rd, 2016.

Microsoft co-founder and former CEO Bill Gates has voiced his opinion on the encryption debate surrounding an FBI demand seeking Apple to create a backdoor for an iPhone belonging to one of the terrorists in the San Bernadino shooting. It’s an opinion that’s bound to surprise many. In a rare instance of a tech community veteran agreeing...

Featured

Cybersecurity

Mark Zuckerberg Supports Apple’s Stance on Encryption

Posted on February 22nd, 2016.

Facebook CEO Mark Zuckerberg has weighed in on the encryption debate engulfing Apple, the US Government and the FBI in recent weeks by backing Apple in its unrelenting pro-encryption stance. Speaking at the Mobile World Congress in Barcelona today, Facebook CEO Mark Zuckerberg publicly stated his support for Apple in the technology...

Featured

Cybersecurity

Apple Reveals FAQs Answering Questions about Pro-Encryption Stance

Posted on February 22nd, 2016.

Following Tim Cook’s all-encompassing open letter that revealed the US Government’s request to create a backdoor for an iPhone, Apple has released a new FAQ that answers questions that followed the original open letter. Once again, Apple has reiterated its stance on being for encryption as well as dispelling doubts and concerns on its...

Featured

Cybersecurity

Apple CEO Tim Cook: Building iPhone Backdoor is ‘Dangerous’; Govt Demand is ‘Chilling’

Posted on February 17th, 2016.

        Apple CEO Tim Cook, easily among the most vocal advocators of encryption in the world has, in an open letter today, passionately vowed to fight the US government over a court order that demands unrestricted backdoor access to an iPhone. When the government comes knocking with a court order to demand that a...

Featured

Breaches

Weak Passwords Leave VoIP Phones Vulnerable To Hacking, Experts Warn

Posted on February 16th, 2016.

VoIP phones can be hacked on account of weak passwords, according to security researchers, IT PRO reported. Hackers can make and take calls, transfer them without the user’s knowledge and listen in on private conversations. Security researchers warned that the Internet telephony handsets used in many enterprises are vulnerable to attack...

The team:
Dmitriy Lavrov
Analyst
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Founder
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com.
Mate Csar
Analyst
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Mati Greenspan
Analyst
Senior Market Analyst at Etoro.com.
Rakesh Upadhyay
Analyst
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com.
Joseph Young
Journalist
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More