hackers

Iranian Government Accused of Phishing-Based Cyber Espionage

State-sponsors hackers have been in the news for quite a while. With former NSA contractor, Edward Snowden exposed NSA’s Prism operation in 2012, basically a global espionage. The Lazarus group allegedly connected with North Korean regime, accused of being responsible for the Sony Pictures of America data breach of 2014 and WannaCry ransomware attacks of

[ Read More ]

Is The Latest Medical Hack The Last Straw In Attacks?

If you are worried about your bank account and credit score, you might want to think about something a whole lot worse—namely, the hackers out there who have started targeting medical devices as a method for bringing harm and even death to others. That’s right—it turns out the very same devices that can save your

[ Read More ]

WordPress Is King—But Vulnerable—And Not Immune To Attack

If there is a God of the digital world, WordPress might as well be it. It is considered by the masses as the “go-to” tool for website or blog creation—and as an internet platform, it powers a staggering one third to one half of all websites in existence, stealing a substantial portion of market share

[ Read More ]

Sex, Work, And Malware: How To Avoid These Virtual STDs

Despite their devilish tactics, you have to give it hackers—they sure are creative at coming up with new and unexpected way to infiltrate your privacy and infect your systems with malware. Everyone knows the best kinds of hacks involve reverse engineering of the human mind, where a certain behavior can open up a world of

[ Read More ]

How In The World Did Hacking Go From Mischief To Maleficence?

In the beginning, like way back in the late 1800s, hackers were not even hackers—they were really more like practical jokers. When Bell Telephone first started up its operations, all incoming and outgoing phone calls had to be routed through a main switchboard, which created the perfect opportunity for some teenage boys who had been

[ Read More ]

Is The Department Of Labor Exposing Your Employee Benefits To Attack?

In the U.S. and Canada, the first Monday of September is dedicated to Labor Day, a public holiday established to honor the social and economic achievements of hard working Americans throughout history. According to the U.S. Department of Labor (DOL), the event recognizes how the average employee has directly contributed to the current strength and prosperity

[ Read More ]

How The Youngest Hacker In The World Exposed Microsoft At Just Five

Typically, children at five-years-old are in the throes of developing greater independence, self-control, and creativity, not to mention they are beginning to concentrate more readily on the various tasks and toys they see in front of them. Most kids at this age enjoy singing, rhyming, imaginary play, and other silly, energetic pursuits older parents might call

[ Read More ]

How Did This Clever Teenage Kid Hack Apple’s Server?

A Melbourne student has pleaded guilty to hacking into Apple’s secured system after the organization told experts of the interruption (via The Age). The teenage minor, who can’t be named for legal reasons, showed up at an Australian Children’s Court on Thursday facing allegations of hacking into Apple’s servers on different events. Details of the

[ Read More ]

Here Are The Creepy Details Of The Dark Web In A Nutshell

Contrary to what most internet users believe, only about four percent of the web is actually visible to the average person. That means approximately 96% of the world’s biggest public network remains in the dark, access only through TOR. And as we know, this is where many of today’s exploits, attacks, and malicious plots are

[ Read More ]

The Surprising Ways Your Stolen Data Is Now For Sale On The Internet

Stolen bank details, credit card info, and plenty of other damaging information are now for open sale on the dark web—it’s no secret. For a few years now, it has been the place to trade illegal merchandise of all kinds, including the personal information of those scammed by phishing attacks and similar exploits. While this realization

[ Read More ]