How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Most Recent
Read More
March 29, 2016

The FBI Hacks the iPhone; Apple Exempt from Creating Backdoor

The case of the United States Government via the FBI vs Apple is finally over. Following months of work in trying to find a way to break into the San Bernardino terrorist’s iPhone, the FBI has finally found a way through.

The government has withdrawn its case against Apple. The court case and the very public tussle between the FBI and Apple is over.

While details are scarce, the result of the entire ordeal proves to be somewhat of a victory to Apple. The software and hardware giant is no longer required to create a custom OS as a backdoor to aid the FBI in gaining access to the locked iPhone 5c belonging to one of the San Bernardino shooters.

Just last week, a [...]

Read More
January 23, 2016

GCHQ-developed Phone Security Contains Backdoor

In recent months, we’ve learned governments believe there should exist backdoors in tech’s biggest products. We’ve also learned, recently, they’re no hypocrites: the UK government’s official voice encryption protocol has a glaring backdoor allowing security services to eavesdrop, according to new research. The UK government planned to build an assortment of products based on the technology, but this might be under review considering the findings of one cybersecurity expert.

University College London cybersecurity expert, Dr Steven Murdoch, wrote a blog post regarding the MIKEY-SAKKE spec of the UK government’s phone security software, which he conjectures was designed [...]

Read More
December 21, 2015

Study: U.S. Power Grid Is Vulnerable to State-Sponsored Hackers

All networks, equipment, and computers can be hacked. A smart coffee maker can be hacked. So too, can a power station that figures in the grid of an entire country. Are such threats overstated? Or, is there a genuine reason to be concerned?

Here’s the good news first. Malicious attackers haven’t pulled the plug to switch off the power from their remote locations. The bad news? It may be entirely possible that a group of ill-intending hackers may have gained the necessary blueprints and knowledge to do just that, after an investigation by the Associated Press revealed that cyber-attackers have systematically carved a hole to gain access to critical operation networks. These [...]

Read More
November 20, 2015

European Union Crisis Meeting Planned to Call for Control of Virtual Currencies after Paris Attacks

Interior and justice ministers from the European Union have organized a crisis meeting this Friday to plan an effective crackdown of anonymous payment method and virtual currencies to curb terrorism funding.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University