How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘2016’
Most Recent
Read More
January 26, 2016

What to Expect from Cybersecurity in 2016, According to the Hacktivists Fighting ISIS

According to Ghost Security Group, 2016 will be an eventful year in cybersecurity. Ransomware, ISIS, Bitcoin, hacks and breaches will likely paint the headlines as they did in 2015. 

“As was seen recently with the Ransom32 software earlier this year, ransomware is only getting better,” Ghost Security Group activist Akenalus told Hacked. “At some point it may even begin scanning our computers, extracting credit card information and automatically paying its own ransom.” This isn’t likely to happen any time soon, but it will be coming in the next few years.

“We can most definitely expect ransomware to be more commonly used, maybe even being used to take over things [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University