How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘spying’
Most Recent
Read More
December 10, 2015

Surveillance Age Love

What do you think: Is spying on your lover okay? One survey found approximately one-third of people are okay with spying on their loved ones. A recent report out of Australia showed that nearly half of young Australians think spying on their partner via computer, phone or otherwise is acceptable. A simple Google search shows people are thinking about it.

A survey at OurTime.com showed, “33% of Americans aged 18 and over, believe it’s OK to snoop through a significant other’s text messages, voicemails and email if ‘bad behavior’ is suspected.” According to eHarmony,  approximately 43 percent of men and 54 percent of women do browse someone’s internet footprint before [...]

Read More
November 13, 2015

Facebook Sides With Identity Thieves

Open teaching is the idea that people have the right to learn regardless of their ability or circumstance. The diversity of the people they interact with makes for a much larger attack surface, with a huge range of connections on Facebook and elsewhere. But here we’ll focus on Facebook and some recent incidences.

Readers may not be aware, but Facebook has a rigorous process for dealing with the authenticity of account usage. If your account is hacked, there are ways to get it back regardless if you remember your password or the hacker continually manages to get back in. Facebook grants itself wide latitude in these matters, which could be wise in that they’ll never [...]

Read More
October 27, 2015

Google Stores Your Voice Searches

Google users probably are aware that Google keeps a record of all searches made by a given logged-in user. Likely enough, they also keep track of the data by other means, such as IP address, though this is not advertised. Google does its best to make the tracking into a feature. Occasionally one might actually forget what they’d searched for awhile back, and use the Google history feature to search for something again.

In reality, these searches are likely used to build improved search profiles, so that Google knows better what to serve its users. Potentially, given all the other metadata that Google is able to collect, such searches could also be useful to law [...]

Read More
January 2, 2015

NSA Uses Christmas Holiday to Minimize Coverage of Documents Vindicating Snowden

The United States National Security Agency (NSA) recently released a variety of documents containing oversight reports in compliance with a court order from this past summer. The American Civil Liberties Union (ACLU) obtained access to the documents via a Freedom of Information Act (FOIA) request. According to the agreement, the NSA was supposed to release the documents on December 22. However, the ACLU claims the NSA released the documents–many of which back up NSA whistleblower Edward Snowden’s claims about the organization’s misconduct–late to take advantage of most Americans’ preoccupation with Christmas festivities and minimize the documents’ [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University