Skip to main content

The Latest

  • An example of a Snapshot dongle plugged in
    Progressive Insurance snapshot dongle is hackable and can weaponize cars
    Jalopnik reported earlier yesterday (Jan. 20, 2015) that an independent security researcher has confirmed the security vulnerabilities (or lack thereof) that lie within the OBDII dongle that Progressive Insurance provides more than 2 million...
  • Blackhat starring Chris Hemsworth
    'Blackhat' review: Typical Michael Mann, and that's the problem
    Michael Mann has lost it. The director, who has been defined for his specialized visuals and insular storytelling in films from Thief to Heat to Collateral, has lost his cinematic appeal. His last picture, Public Enemies, was a mixed bag of a...
  • Hacker's List gives everyone the opportunity to hire a hacker
    Hacker's List gives everyone the opportunity to hire a hacker
    When it comes to hackers, the world’s attention is largely captivated by large hacks for sensitive information, like the one against Sony, or ones orchestrated for fun or to create chaos. But while all that has been doing on, a small...
  • What is Ransomware?
    What is Ransomware?
    Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly a notice flashes on your screen saying your computer has been compromised and in order to get your files back, you need to pay up some money. This...
  • Russian Hackers getting rich from your Identity
    Russian Hackers getting rich from your Identity
    Where’s the $$$ at? Selling credit card data. Have you heard of the Russian hacking ring that raked in two and a half billion dollars? Check it out:Phishing attacks are lucrative for these cybercriminals.ATM hacks continue to increase, in...
  • Visual Hacking is High Tech Shoulder Surfing
    Visual Hacking is High Tech Shoulder Surfing
    A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over your shoulder while you’re using your computer or mobile (“shoulder surfing” or ...
  • Russian website is live streaming webcams of unsuspecting victims worldwide
    Russian website is live streaming webcams of unsuspecting victims worldwide
    On November 20, 2014 The United Kingdom government, through the Information Commissioner's Office (ICO), issued a shocking warning: live footage streaming from your webcam may be currently shown on a Russian website, which features video...
  • 10 tips to Secure Passwords
    10 tips to Secure Passwords
    Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remember and sentimental to use, this approach...
  • MH370 passengers disappeared on Boeing 777 by sophisticated hacker
    MH370 passengers disappeared by high-tech hacker
    The suspect who disappeared Malaysia Airlines flight MH370 and its 239 passengers and crew is a technical genius with highly sophisticated hacking skills, according to an expert's analysis released Tuesday that exonerates the Boeing 777's...
  • Cyber fugitive John Gordon Baden arrested by the FBI
    Cyber fugitive John Gordon Baden arrested by the FBI
    On November 4, 2014, FBI announced the arrest of John Gordon Baden, 38, who was considered one of San Diego, California’s FBI Most Wanted Cyber Fugitives. Baden was arrested on November 1, 2014, in Tijuana, Mexico, by officers from the...
  • Movie 'The Hacker Wars' proves we are under U.S. government surveillance
    Movie 'The Hacker Wars' proves we are under U.S. government surveillance
    On Oct. 14, 2014 Examiner Dorri Olds landed an exclusive interview with filmmakerVivien Lesnik Weismanto talk about her film, "The Hacker Wars."Weisman’s new documentary, “The Hacker Wars,” is frightening and a must-see...
  • Next move unclear after saved Snapchat image database leaked by hackers
    Next move unclear after saved Snapchat image database leaked by hackers
    After posting threats to 4Chan on Friday, hackers have released the database containing 13 gigabytes of Snapchat photos and videos on Sunday. According to The Guardian on Monday, a website called Snapsaved.com is the actual source of the leaked...
  • What to do in the Aftermath of an Attack
    What to do in the Aftermath of an Attack
    Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked.After the attack, locate the portal through which the crumb-bag entered....
  • Researchers say your Mobile Carrier’s Network isn’t all that Secure
    Researchers say your Mobile Carrier’s Network isn’t all that Secure
    Gee, even the tools that update your smartphone’s operating system over the air have holes that hackers can slip into.It’s estimated that as many as two billion handsets are vulnerable, and in some instances, security patches haven...
  • Botnets Here, Botnets There, Botnets EVERYWHERE
    Botnets Here, Botnets There, Botnets EVERYWHERE
    What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software&mdash...