Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Identity Theft
Most Recent
Read More
September 28, 2016

Anonymous India: Mobile Network Reliance Jio is Sharing Call Data with Advertisers

The hacking group Anonymous is accusing the telecom network, Reliance Jio, of sharing its call data with advertisers in the U.S. and Singapore.

In a recent blog post, Anonymous India exposes how Reliance Jio has been sharing customers’ call data with foreign companies. Anonymous India also provide steps to see how Reliance Jio are sharing the data.

It said:

A year ago we had posted about how Reliance Jio was sharing user location data with China. One year on and nothing has changed.

In the blog post, Anonymous India claims that data from Reliance Jio’s My Jio and Jio Dialer apps are being sent to an advertiser called Mad.Me. It further adds that Reliance [...]

Read More
September 8, 2016

OPM Breach: How Officials Missed a Second Hacker

US officials were too focused on purging a hacker from government’s computers after closely monitoring the hacker’s online movements for months and were about to expel him that they failed to realize that there was another hacker entirely.

Read More
September 5, 2016

800,000 Accounts Compromised in Porn Site Brazzers Forum Hack

A breach of major porn provider Brazzers’ forum has resulted in the leaking of around 800,000 user accounts.

Read More
August 9, 2016

Security Flaw in Credit Card Chip System Revealed

Payment technology company firm NCR has discovered a new security flaw in the upgrade in the credit card chip system in the United States.

At the recent Black Hat computer security conference in Las Vegas, computer security researchers unveiled how they had found a way to bypass the chip’s security features, according to CNN.

A card will still have the magnetic strip attached to it so that they can still be used to purchase goods and services from a merchant that has yet to upgrade to EMV-enabled terminals.

However, according to CNN, the computer security researchers showed attendees how thieves are able to simply rewrite the magnetic stripe code so that it [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University