Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Science
Space
Cybersecurity
Bitcoin
Darknet
Technology
dark net
Hardware
Most Recent
 
Read More
November 24, 2016

Israeli Researchers Turn Speakers/Headphones Into Eavesdropping Microphones

In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard.

Using software alone, Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici were able to convert a given pair of headphones or speakers into Orwellian microphones beyond the user’s control or ability to patch. Their method [PDF] exploits a flaw in RealTek hardware chips, which are one of the most widely used chips in motherboards [...]

48730
 
Read More
November 4, 2016

Chinese Physicists Achieve Record-Breaking Quantum Cryptography Breakthrough

Researchers at the University of Science and Technology of China and other Chinese labs, with the collaboration of a lab in the US, have implemented a secure quantum protocol known as Measurement-Device-Independent Quantum Key Distribution (MDIQKD), suitable for practical networks and devices, over a distance of 404 km. The breakthrough, which doubles the previous MDIQKD record, opens the door to secure wide area quantum communication networks.

309359
 
Read More
September 24, 2016

Dot: Precision Tracking Hardware Makes Your Smartphones Smarter

A team of five Berkeley engineers has developed a new hardware product that utilizes precision location tracking to make smartphone notifications highly intelligent and contextual.

In the technology-minded world that we live in it’s nearly impossible to walk down the street without encountering someone on their phone. However, with the amount of information that we store in our phones it can be difficult to filter out what’s important and what’s not.

This is where Dot enters the scene.

Developed by startup Iota Labs, Dot is a physical push notification that informs your smartphone where you are so that it can determine your patterns and behaviors in the [...]

15540
 
Read More
September 12, 2016

This “USB Killer” Drive Will Fry Your Gadget

Hong Kong-based company USB Killer believes that “any public facing USB port should be considered an attack vector.”

59941
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University