Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
July 22, 2016

Donald Trump Is All about the ‘Cyber’ with Cybersecurity

Donald Trump could become the next President of the United States. If and when he does, the subject of cybersecurity and the widening scale of cyberattacks will firmly be on the agenda. So what does Trump have to say about a subject that requires a certain understanding and nuance?

Donald Trump, now officially the Republican candidate for the Presidency ahead of the 2016 US Presidential elections, will have to tackle issues such as cybersecurity and the increasing number of cyberattacks from hackers beyond his shores, state-sponsored or otherwise.

In a telling interview with the New York Times, Trump inadvertently revealed his true grasp of cybersecurity while outlining [...]

Read More
July 19, 2016

In 2016, 1Gbps DDoS Attacks Are the New Norm


 The first six months of 2016 have shown that DDoS attacks are only escalating in their frequency as well as their scale, according to the latest global report by DDoS mitigation firm Arbor Networks.

A DDoS report released by software firm Netscout’s DDoS mitigation arm Arbor Networks has revealed the single largest attack observed, registering at a massive 579Gbps. That’s a 73 percent increase from the peak DDoS attack observed in 2015.

DDoS attacks are among the most frequently used and prominent cyberattacks because of the relative ease of availing inexpensive DDoS tools by anyone with a grudge and an internet connection. Suffice to say, DDoS attacks [...]

Read More
July 13, 2016

Automaker Fiat Chrysler Announces Bug Bounty Program

The latest bug bounty program from an automobile manufacturer comes from Fiat Chrysler, more than a year after two white hat hackers proved that they could remotely compromise and take control of its popular selling vehicle, the Jeep Cherokee.

White hat hackers can now start picking away at cybersecurity flaws in the vehicle software embedded in Fiat Chrysler connected cars. The bounty program is specifically focused on the automaker’s fleet of connected vehicles, including the systems used within them as well as the applications and external services that are connected to them.

The bounty reward is relatively small compared to the bug bounties offered by the likes of [...]

Read More
July 13, 2016

Researcher: Pokémon GO is a Huge Security Risk

The phenomenon that is Nintendo’s Pokémon registered another massive (and arguably its biggest) hit with the release of Pokémon Go, a mobile app game so successful that it helped rocket Nintendo’s shares through the roof. With popularity comes scrutiny and one security researcher has pointed to a significant security risk concerning the iOS and Android versions of the app.

Pokémon Go users, pay attention. Internet security expert Adam Reeve has found a problem with the game, one that makes your entire Google account vulnerable if you’re playing the game.

To play the game, users are first required to set up an account. For whatever the reason, the developer of the game, [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University