Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Stephen Hawking
Most Recent
Read More
October 13, 2016

Gorillaz Web Shop Redirects To Family-Oriented Guns & Ammo Dealer

For several weeks, the official Gorillaz web shop – – has redirected to Betty’s Country Grocery in Stokes County, North Carolina.

The building where Betty’s Country Grocery is located was built in the early 1940s, but Betty did not run her business from the location until she bought it from the County Sheriff, Tony Blalock, in 1986. She’s proud of her family business. “Only family works here,” Betty tells She’s never heard of Gorillaz, and finds it interesting that their shop has redirected to her website.

Gorillaz shop on wayback machine in 2004

“We are just trying to [...]

Read More
October 11, 2016

Atomic Energy Director: Nuclear Power Plant Saw ‘Disruptive’ Cyber Attack

The head of the United Nations’ nuclear watchdog revealed that a nuclear power plant was the target of a disruptive cyberattack two to three years ago.

“We never know if we know anything…” said the director of the International Atomic Energy Agency, the world’s foremost nuclear watchdog, when it comes to cyberattacks targeting nuclear power plants.

Lower the alarm bell, though. The attack was described by International Atomic Energy Agency (IAEA) director Yukiya Amano as disruptive, insisting that it wasn’t “destructive.” That said, he also revealed that an individual tried to smuggle a small amount of highly enriched uranium four years [...]

Read More
September 20, 2016

Majority of Monero 3rd Party Wallets Vulnerable to Theft, Says Security Advisory


A security firm has published an advisory that warns Monero users of a vulnerability that would enable a hacker to steal the cryptocurrency from a majority of third-party digital wallets.

Read More
September 20, 2016

Hackers Successfully Remote Attack a Tesla Model S

A group of Chinese hackers has posted a video that supposedly demonstrates the impact of their remote attack vector on Tesla Motors.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University