Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Most Recent
Read More
August 18, 2016

British Whizz Kid Hacks Pokemon Go; Catches Monsters Without Breaking a Sweat

A 25-year-old British former computer science student has discovered a loophole in the popular Pokemon Go allowing him to catch Pokemon without leaving the comfort of his home.

According to reports, players of the game have resorted to donating thousands of pounds to keep Mark Gore’s ‘bot’ running. Five lawyers are alleged to have urged him to remove the programme.

Mr Gore has stated that his loophole wasn’t designed to take the fun out of the game, which is reported to have seen users harassed by police for walking into restricted areas, according to the British tabloid newspaper, the Sun.

He stated that it was easy exploiting the game, [...]

Read More
August 16, 2016

Shadow Brokers Hacking Group Claim to Have NSA Hacking Tools for Sale

A hacking group by the name of Shadow Brokers is claiming that it has National Security Agency hacking tools for sale.

In an Internet posting, the group said that they have a ‘full sponsor state tool set’ of cyberweapons, which the group claim belongs to the Equation Group, which is believed to be an NSA affiliate, according to a news report from RT. In a bid to back up their statement they posted what appears to be sample attack code.

Shadow Brokers are offering to sell the complete set of tools to the highest bidder. They are seeking to raise 1,000,000 bitcoins, worth around $568 million USD.

While there are bound to be some who may doubt the group [...]

Read More
August 5, 2016

The Future of Cybersecurity May Be with Supercomputers

Seven supercomputers recently took part in a virtual contest that saw them competing against one another in a bid to find software vulnerabilities.

Taking place in Las Vegas at DEF CON, a cybersecurity event, the seven supercomputers participated in the Cyber Grand Challenge where they were tasked with playing the hacking game Capture the Flag, which focuses on detecting software vulnerabilities.

It’s usually human hackers who take part in the game to detect vulnerabilities; however, it often takes humans a lot longer to identify flaws compared to supercomputers.

According to PC World, at the recent DEF CON conference, no human hackers took part, only the [...]

Read More
June 12, 2016

Zero Day Offer To Attack Windows For Profit Part Of A Rising Trend

SpiderLabs, a team of ethical hackers that fights cybercrime, recently posted a blog about a recent zero day offer to attack Windows that demonstrates how such offerings are marketed and becoming more common.

Zero day is a disclosed software vulnerability that hackers can exploit to attack computer programs, data, additional computers or a network, according to Wikipedia. SpiderLabs is a part of Trustwave, a company that helps businesses fight cybercrime, protect data and reduce security risk.

SpiderLabs notified Microsoft about the zero day offering and continues to monitor the situation. The blog is titled, “Zero Day Auction for the Masses.”

Cyber Crime [...]
How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University