Skip to main content
Report this ad

The Latest

  • Even Hackers get hacked
    Even Hackers get hacked
    Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments.An article on wired.com describes how...
  • Hacker isn't a bad Word
    Hacker isn't a bad Word
    Did you know that the original meaning of hacker, as far as computers, was that of a person who built codes into computers? In fact, the bad guy was called a “cracker.” Somehow, “cracker” didn’t catch on. But the...
  • Private Investigator faces Jail for Hacking
    Private Investigator faces Jail for Hacking
    What a disgrace: A private investigator, Eric Saldarriaga, 41, got nailed for hacking into peoples’ e-mails. He may get six months in the can. Is six months reasonable for this, though?A recent online New York Times article quotes a...
  • Why Hacking is a National Emergency
    Why Hacking is a National Emergency
    Foreign hackers, look out: Uncle Sam is out to get you. President Obama has issued an order that allows the State Department and Treasury Departments to immobilize the financial assets of anyone out-of country suspected of committing or otherwise...
  • Identity Theft
    Identity Theft: Should you subscribe to an ID protection service?
    Tax season had barely begun when we got the newsthat hackers had broken into Intuit’s online TurboTax service and stolen customer refunds. Others used the service to create fake returns and collected refunds this way. Originally up to 18...
  • Hackers for Hire both Good and Bad
    Hackers for Hire both Good and Bad
    Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s...
  • Password Security vulnerable to Trickery
    Password Security vulnerable to Trickery
    There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?Well, suppose...
  • The White Hat Hacker
    The White Hat Hacker
    These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year.While a lot of information, including...
  • Lenovo notebook hacked
    What to do if your Lenovo notebook is hacked & Identity theft help
    In September 2014, Lenovo installed Superfish software on certain notebooks. Unfortunately this software has shown to have vulnerabilities that make it easier for hackers to access your personal information. If you have a newly purchased Lenovo...
  • An example of a Snapshot dongle plugged in
    Progressive Insurance snapshot dongle is hackable and can weaponize cars
    Jalopnik reported earlier yesterday (Jan. 20, 2015) that an independent security researcher has confirmed the security vulnerabilities (or lack thereof) that lie within the OBDII dongle that Progressive Insurance provides more than 2 million...
  • Blackhat starring Chris Hemsworth
    'Blackhat' review: Typical Michael Mann, and that's the problem
    Michael Mann has lost it. The director, who has been defined for his specialized visuals and insular storytelling in films from Thief to Heat to Collateral, has lost his cinematic appeal. His last picture, Public Enemies, was a mixed bag of a...
  • Hacker's List gives everyone the opportunity to hire a hacker
    Hacker's List gives everyone the opportunity to hire a hacker
    When it comes to hackers, the world’s attention is largely captivated by large hacks for sensitive information, like the one against Sony, or ones orchestrated for fun or to create chaos. But while all that has been doing on, a small...
  • What is Ransomware?
    What is Ransomware?
    Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly a notice flashes on your screen saying your computer has been compromised and in order to get your files back, you need to pay up some money. This...
  • Russian Hackers getting rich from your Identity
    Russian Hackers getting rich from your Identity
    Where’s the $$$ at? Selling credit card data. Have you heard of the Russian hacking ring that raked in two and a half billion dollars? Check it out:Phishing attacks are lucrative for these cybercriminals.ATM hacks continue to increase, in...
  • Visual Hacking is High Tech Shoulder Surfing
    Visual Hacking is High Tech Shoulder Surfing
    A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over your shoulder while you’re using your computer or mobile (“shoulder surfing” or ...
Report this ad