Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘Cybersecurity’
Most Recent
Read More
October 5, 2016

Cybersecurity Spending Doubles Threat Growth Sees UK Businesses Spend More On Security

As the threat of cybersecurity grows in the U.K. companies are reported to be spending twice as much to prevent their businesses from being targeted, reports City A.M.

In 2016 budgets spent on cybersecurity more than doubled compared to that spent in 2015. It’s reported that, on average, the budget rose to £6.2 million per business as the threat of cyberattacks continued to increase.

According to a PwC’s yearly Global State of Information Security Survey, the cost of preventing cyberattacks and security breaches on businesses has grown by more than half to £2.6 million. Despite interviewing over 10,000 executives from 133 countries, the survey found that U.K. companies [...]

Read More
September 23, 2016

India Ranks Fourth Globally in Ransomware Attacks

India is facing a major issue as ransomware attacks continue to rise in the country as it ranks fourth in the country and the world.

Read More
August 19, 2016

Opinion: Bridging the Cybersecurity Gender Gap

In an opinion piece in the Christian Science Monitor, more needs to be done to attract more women to the cybersecurity fields.

According to the CSM, in 2015, a mere 25 percent of women held computing jobs while companies such as Twitter and Google have been widely criticized for not bridging the gender gap in the workforce.

Not only that, but a report from the Women’s Society of Cyberjutsu found that only 11 percent of jobs in the cybersecurity field were held by women.

Digital Privacy Ahead of its Game

When it comes to digital privacy, though, it has done much better compared to other fields.


Well, according to CSM, it’s [...]

Read More
August 15, 2016

Lock Picking at Cybersecurity Conference Def Con

When you think of lock picking you might not put it with a cybersecurity conference such as Def Con. However, the recent conference in Sin City demonstrated that the traditional method of picking locks is essential to teaching individuals how to protect machines from digital threats letting them unleash their inner child.

With remote attacks over the Internet being blocked through improved security, opportunistic hackers are searching for ways to deliver malicious software physically instead. Being able to crack a digital system, though, requires a level of skill and finesse, which is why it’s ideal for the good guys to know how to pick locks so that they can defend [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University