How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘hacked’
Most Recent
Read More
April 2, 2016

Your Teledildonic Session Might Get Hacked

The Internet of Things is extremely new and extremely vulnerable. In fact, it’s so vulnerable, it could get you in trouble at your most vulnerable: during sex or masturbation. Today, smart vibrators are offering all sorts of options: a new form of cyber sex where the web is used by two people in the same room enhance their sex (usually with a connected sex toy device; and even for people to film themselves, and even sex organ exercise smart devices.

It’s these sorts of devices researchers fear could be vulnerable to hackers.

Software firm Trend Micro stated last week that as the Internet of Things consumes further aspects of daily life, it could be used on [...]

Read More
November 23, 2015

Hacked Targeted by DDoS Extortionists; We’re Offering a Bounty

Update: Please send your material and findings, if any, [email protected]

Hacked and sister-site CryptoCoinsNews (CCN) were the targets of a DDoS attack by extortionists demanding a bitcoin payment as ransom.

Early this morning (UTC), Hacked.com was the subject of a DDoS-based cyberattack designed to shut down the website in exchange for a payment of 2 bitcoins (approx. $648 USD).

An email came in from one of the extortionists who went by the name ‘Jon’ and carried the threat of contacting our advertisers to let them know the websites are down, if the payment wasn’t made within the hour.

To resolve the situation quickly, all we had to do was [...]

Read More
March 2, 2015

I’ve Been Hacked – What To Do After You’ve Been Hacked

There’s nothing quite like that feeling of dread that slowly envelops you when you realize you’ve been backed. Regardless if it’s just your social media account or something as serious as your bank account or credit card, you can’t escape those first few moments of confusion, anger, and the overwhelming sense of fear. You don’t know how they got your information, what other accounts they’ve had access to, how long they’ve had access, and it’s terrifying. So I’ve come up with a checklist to help you protect yourself from further damage and begin the repairing process.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University