How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘DDoS Attacks’
Most Recent
Read More
November 23, 2015

Hacked Targeted by DDoS Extortionists; We’re Offering a Bounty

Update: Please send your material and findings, if any, [email protected]

Hacked and sister-site CryptoCoinsNews (CCN) were the targets of a DDoS attack by extortionists demanding a bitcoin payment as ransom.

Early this morning (UTC), Hacked.com was the subject of a DDoS-based cyberattack designed to shut down the website in exchange for a payment of 2 bitcoins (approx. $648 USD).

An email came in from one of the extortionists who went by the name ‘Jon’ and carried the threat of contacting our advertisers to let them know the websites are down, if the payment wasn’t made within the hour.

To resolve the situation quickly, all we had to do was [...]

Read More
February 24, 2015

DDoS Attacks Land 51-Year-Old UK Hacker Under Arrest

It’s all fun and games until you get caught, right? Well, in the eyes of the United Kingdom it’s never just fun and games when it comes to hacking. A 51-year-old man from Merseyside is now facing serious jail time for his distributed denial of service (DDoS) attacks that happened in 2013.

Read More
December 12, 2014

Sony is Counter-Hacking With DDoS Attacks

Entertainment giant Sony was recently hacked in one of the most damaging cyberattacks ever. North Korea is considered a suspect, but the country’s officials denied any involvement. After the terrible hack, the company is now taking a stand and counter-hacking to keep its leaked files, which include five unreleased movies, from spreading across torrent sites, Slate reports.

The hackers who infiltrated Sony Pictures, known as “Guardians of the Peace,” have released five troves of Sony data over the past few weeks. The company’s countermeasure involves overwhelming torrenters with network requests if they attempt to download files from the leak.

Sony is Using Hundreds of [...]
How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University