Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategorySoftware
Featured

Cybersecurity

5 Best VPN for Torrenting that Guarantee You True Anonymity

Posted on February 14th, 2017.

Heard the news about several people across the globe getting legal notices from HBO over suspicions of downloading pirated version of Game of Thrones episodes? Well, this truly captures the essence of why people are looking for guaranteed anonymous VPN torrents services that help them use torrents and P2P networks for file sharing like...

Featured

Cybersecurity

The Department of Defense Is about to Enhance Its Deep Web Search Engine

Posted on December 6th, 2016.

A lot of people have never heard of Memex. Memex is a deep web search engine developed by DARPA (Defense Advanced Research Projects Agency), the agency that created the ARPANET, which served as a basis of the internet we use nowadays. Memex is a deep web search engine that doesn’t quite work like Google or Bing. DARPA sees Memex as a set...

Featured

Companies

Microsoft Joins Linux Foundation, Bets on Open Cloud Computing

Posted on November 17th, 2016.

Only a few years ago the idea that Microsoft could actively promote Linux and join the Linux Foundation would have sounded like science fiction, but that’s exactly what happens now: Microsoft is joining the Linux Foundation as a Platinum member.

Featured

Fun Hacks

British Whizz Kid Hacks Pokemon Go; Catches Monsters Without Breaking a Sweat

Posted on August 18th, 2016.

A 25-year-old British former computer science student has discovered a loophole in the popular Pokemon Go allowing him to catch Pokemon without leaving the comfort of his home. According to reports, players of the game have resorted to donating thousands of pounds to keep Mark Gore’s ‘bot’ running. Five lawyers are...

Featured

Breaches

Shadow Brokers Hacking Group Claim to Have NSA Hacking Tools for Sale

Posted on August 16th, 2016.

A hacking group by the name of Shadow Brokers is claiming that it has National Security Agency hacking tools for sale. In an Internet posting, the group said that they have a ‘full sponsor state tool set’ of cyberweapons, which the group claim belongs to the Equation Group, which is believed to be an NSA affiliate, according...

Featured

Cybersecurity

The Future of Cybersecurity May Be with Supercomputers

Posted on August 5th, 2016.

Seven supercomputers recently took part in a virtual contest that saw them competing against one another in a bid to find software vulnerabilities. Taking place in Las Vegas at DEF CON, a cybersecurity event, the seven supercomputers participated in the Cyber Grand Challenge where they were tasked with playing the hacking game Capture...

Featured

Bugs

Zero Day Offer To Attack Windows For Profit Part Of A Rising Trend

Posted on June 12th, 2016.

SpiderLabs, a team of ethical hackers that fights cybercrime, recently posted a blog about a recent zero day offer to attack Windows that demonstrates how such offerings are marketed and becoming more common. Zero day is a disclosed software vulnerability that hackers can exploit to attack computer programs, data, additional computers or...

Featured

Cybersecurity

Antivirus Scan Stalls Heart Procedure for a Full 5 Minutes

Posted on May 16th, 2016.

A crucial medical device crashed during a heart procedure due to an antivirus scan that managed to crash the equipment, requiring doctors to perform a reboot of the computer entirely. An antivirus software installed on a PC led to an untimely crash during a heart procedure, causing doctors to reboot the computer, disrupting the procedure...

Featured

Cybersecurity

FBI Paid Hackers Over $1.3 Million to Hack iPhone

Posted on April 22nd, 2016.

The iPhone belonging to one of the San Bernardino shooters has been at the center of stand-off between the FBI and Apple in recent times. While Apple stuck to its no-backdoor policy, the FBI eventually recruited the help of grey-hat hackers to crack the iPhone. The cost for such a hack-job? Over $1.3 million. The highest ever publicly...

Featured

Cybersecurity

LastPass Launches Its Own Two-Factor Authentication App

Posted on March 16th, 2016.

Popular password manager and vault LastPass has launched a free two-factor authentication (2FA) app that compliments its password manager and vault, bringing added security to users. The application is also designed to be used with “hundreds” of popular applications and websites, including Amazon, Dropbox, Evernote, Facebook and more....

Featured

Business

Apple Tells Court Not To Force Them To Undermine iPhone Security

Posted on February 28th, 2016.

Apple on Thursday filed a motion to vacate the order compelling it to assist the government in the search of an iPhone seized from a terrorist in the San Bernardino attack. The company filed the motion in the U.S. District Court Central District of California Eastern Division. On Feb. 16, 2016, the government asked the court to compel...

Featured

Breaches

Ukraine To Scrutinize Cyber Defenses Following Attack On Airport Linked To Russia

Posted on January 18th, 2016.

A cyber attack on Kiev’s main airport, Boryspil, has prompted a review of Ukrainian computer system defenses, including airports and railway stations, according to Reuters. Officials told Reuters the attack came from a server in Russia. Officials detected malware last week in a computer in the airport’s IT network. The malware is similar...

Featured

Activism

Top Secret Document Indicates NSA Knew Of Juniper Vulnerabilities In 2011

Posted on December 24th, 2015.

Juniper Networks, a Sunnyvale, Calif-based network hardware manufacturer that last week reported finding an unauthorized code in its firmware making it possible for hackers to access its devices, could have been vulnerable for several years, based on a top-secret document released by Intercept, a website dedicated to transparency in...

Featured

Breaches

Report: BitTorrent Malware Risks Call For Better Security Measures

Posted on December 19th, 2015.

Peer-to-peer (P2P) file sharing has become a popular past time, but malware in some files can make downloading games and applications very dangerous to organizations in all types of  industries when the content is downloaded on employers’ networks. A report recently released by BitSight Technologies, a Cambridge, Mass.-based...

Featured

Activism

South American Hacker Group Targets Journalists And Dissidents

Posted on December 9th, 2015.

A group of hackers believed to have sent malware to an Argentine prosecutor who died mysteriously this year has been targeting South American journalists and dissidents, according to the Citizen Lab, an Internet watchdog, the Associated Press reported. The Argentine prosecutor, Alberto Nisman, made international headlines when he died...

Featured

Breaches

U.S. Senators Seek Answers From Feds On Ransomware Attacks Against Government Agencies

Posted on December 6th, 2015.

The Homeland Security and Government Affairs Committee, U.S. Senate committee, has sent letters to the Justice Department and the Department Homeland Security (DHS) asking about the ransomware threat to the public and if any government agencies have paid ransoms to remove ransomware, according to nextgov.com. There have been incidents of...

Featured

Lifestyle

Apple Kicks f.lux Out of iOS For Side Loading

Posted on November 16th, 2015.

Side loading is a technique for Apple iOS which involves using Xcode to install a piece of software. F.lux is a popular desktop program, cross-platform, which allows the user to automatically adjust the brightness of their screen based on the time of day. The developers had recently created an iOS version but found a normal installation...

Featured

Cybersecurity

Cyber Warfare: The New Arms Race

Posted on October 13th, 2015.

After spending billions to build nuclear weapons, a different arms race has emerged in cyber warfare. Where the nuclear arms race pits the larger countries against each other, the cyber arms race includes a much larger number of combatants since it is open to almost anyone with cash and a computer, according to a front-page article in...

Featured

Business

LogMeIn Acquires Password Manager LastPass for $110 Million

Posted on October 11th, 2015.

Popular password manager LastPass is being acquired by remote-access management giant LogMeIn in a deal that’s reportedly worth between $110 million and $125 million. A cash deal will see the acquisition of commonly used password manager LastPass by LogMeIn, a company firmly rooted in the enterprise market with its remote computing...

Featured

Cybersecurity

Adobe Patches Cross-Platform Flash Vulnerabilities

Posted on September 25th, 2015.

On Monday, Adobe released important patches for its Flash Player across all platforms. The patches relate to several vulnerabilities in the Flash Player, several of which could potentially have allowed code execution on the target platform. Flash being used in numerous web advertisement platforms, this update is critical. Just about...