How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Most Recent
Read More
September 15, 2016

Beware Uber Drivers! The Robot Cars Are Coming

Uber announced that that the world’s first self-driving Uber cars are on the road in Pittsburgh, the Steel City. The road ahead is still long, but the implications are staggering.

Read More
September 6, 2016

GPU-Maker Nvidia Moving into Autonomous Vehicles with Chinese Search Giant Baidu

Nvidia and Baidu, which is basically the Chinese version of Google, are teaming up to create a “cloud-to-car” autonomous car platform for auto manufacturers worldwide.

Read More
November 17, 2015

The DEA Digs Your Instagram Bong Selfies

It will come as no surprise to the average Hacked reader that the government is interested in their social media activity. People talk, and a lot of times, give themselves away, even when doing things which can get them in lots of trouble. Thus the DEA, FBI & Secret Service, all of course with some help from the NSA, are quite keen to know what’s going on with social media.

Specifically the DEA revealed as much in their 2015 National Drug Threat Assessment, an annual report the agency publishes. On page 80, they write:

Social media reflects how younger people perceive marijuana use as evidenced by various Internet searches that demonstrate minors using [...]

Read More
November 16, 2015

Apple Kicks f.lux Out of iOS For Side Loading

Side loading is a technique for Apple iOS which involves using Xcode to install a piece of software.

F.lux is a popular desktop program, cross-platform, which allows the user to automatically adjust the brightness of their screen based on the time of day. The developers had recently created an iOS version but found a normal installation was not possible without requisite APIs in iOS, and so encouraged users to install the app using the Xcode method.

Also read: XcodeGhost Malware Threatens iOS users, FireEye Warns

Then Apple contacted the people at f.lux and told them they were being naughty. The developers quickly complied with the [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University