How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Editor’s Pick’
Most Recent
Read More
April 21, 2015

Career Hacker Fleeced by the FBI in Syracuse

Last Thursday, veteran hacker Chris Roberts made a huge mistake. He was enjoying the in-flight WiFi on a United Airlines flight from his home base in Denver to Syracuse, New York when he noticed that certain things were visible to him. Here’s the tweet heard ’round the world:

Read More
April 20, 2015

Ning Doesn’t Believe in HTTPS: Major Vulnerability for 50 Cent’s Social Network

Readers may be surprised to read that there are still websites that use the deprecated, insecure HTTP protocol to authenticate user access. As reported here, the dating website Match.com is one of them. But an even bigger userbase than that is Ning, the site that allows anyone to create a social network.

Read More
April 17, 2015

Florida Bringing Hacking Felony Charges Against 13-Year-Old

The definition of hacking in Florida might get a whole lot broader if Domanik Green is found guilty, now that the Pasco County, Florida prosecutors have apparently not yet decided to drop hacking charges against the 8th grader.

The Serious Crime of Changing a Desktop Background

To be clear from the outset, all this boy did was change a desktop background of a teacher that him and his fellow students disliked. This is not unlike writing on the blackboard behind the teacher’s back, a crime punished with detention. But the Pasco County Sheriffs believe that Green violated Chapter 815 of the Florida law, specifically chapter 06 thereof, which classifies the boy’s [...]

Read More
April 16, 2015

CyberCaliphate Takes French TV Station Offline and Off-Air

The web services of TV5Monde (TV5World) was attacked on the evening of April 9th in a very thorough way. The attack was claimed by ISIS-linked hacking group CyberCaliphate and affected all arms of the organization – broadcasting, websites, and social media accounts.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University