Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Science
Space
Cybersecurity
Bitcoin
Darknet
Technology
dark net
Eavesdropping
Most Recent
 
Read More
November 24, 2016

Israeli Researchers Turn Speakers/Headphones Into Eavesdropping Microphones

In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard.

Using software alone, Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici were able to convert a given pair of headphones or speakers into Orwellian microphones beyond the user’s control or ability to patch. Their method [PDF] exploits a flaw in RealTek hardware chips, which are one of the most widely used chips in motherboards [...]

48730
 
Read More
November 10, 2016

Apple Watches Banned from UK Cabinet Meetings for Hacking Fears

Cabinet ministers have voiced concerns that Apple Watches could be hacked by Russian spies, prompting the devices to be barred from meetings, according to a report from The Telegraph.

Under the new leadership of Theresa May, U.K cabinet ministers have been barred from wearing the watch during meetings after concerns were raised that the gadgets could be employed as listening devices.

The Apple Watches join the list of banned items alongside mobile phones after these were barred for similar reasons.

According to a survey conducted by research firm IDC, Apple Watches account for seven percent of the market compared to FitBit, which is reported to account for 25.4 [...]

24531
 
Read More
November 8, 2016

In Child Porn Bust, FBI May Have Used Malware on Innocent Users

In 2013, the FBI confiscated Freedom Hosting, a service that hosted websites on the dark web, including several child pornography websites and private email service TorMail. When it happened, it was seen as a massive victory, but recently unsealed documents show the FBI may have used malware on innocent users.

Three years ago, the FBI was given a warrant that allowed them to hack 300 TorMail users who were allegedly linked to child pornography. They went with a piece of malware known as a Network Investigative Technique (NIT), with the goal of acquiring users’ real IP addresses.

The agency did manage to arrest a lot of people for child pornography, but documents [...]

30858
 
Read More
October 27, 2016

Are Children Losing Their Childhood to Smart Toys?

Smart toys are on the rise, but while they may have the ability to enhance a child’s play, do they also pose a threat by spying on what children are doing?

In an article from the New Scientist, the issue of privacy is looked into. More specifically, the privacy of children.

Nowadays, it seems it’s no longer a case of simply playing with Ken and Barbie as the imagination of a child takes over. As the article reports, various companies have been looking into how they can capture the imagination of children. One play item, in particular, is the Barbie Hello Dreamhouse and Hello Barbie.

Created by the American toy-company Mattel, Inc., Barbie has been in existence [...]

35632
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University