Home Tags Hack

Tag: hack

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the ‘hacker’ as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people’s computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.

Former PenAir IT staffer gets five-year probation sentence via plea deal.
Ride-hailing service waited a year to disclose hack that stole data of 25 million.

APT Trends report Q1 2018

In the second quarter of 2017, Kasperskyrsquo;s Global Research and Analysis Team (GReAT) began publishing summaries of the quarterrsquo;s private threat intelligence reports in an effort to make the public aware of the research we have been conducting.

This report serves as the next installment, focusing on the relevant activities that we observed during Q1 2018.
Attackers have had almost zero consequences or cost for stealing data from innocent victims.

But what if we could hack their wallets, not their systems?
Report on threat posed by rogue state demands more cash for government hackers North Korea maintains a hacking base in China, the UK Parliament's Defence Select Committee has been told, while government snooping body GCHQ struggles to retain "cyber-sta...
Cisco Talos reveals “multiple vulnerabilitiesrdquo; in hardware common at hospitals.
Security investigations by incident responders at FireEye's Mandiant in 2017 found more prolific and sophisticated attacks out of Iran.
If honest citizens can be tracked online with cookies and beacons that share where we are and what we are doing, then why should security professionals restrict their ability to hack attackers?
IBM X-Force says that threat actors are taking up ransomware in their droves to reap the benefits of criminal activity through blackmail.

Pocket cryptofarms

In recent months, the topic of cryptocurrency has been a permanent news fixture — the value of digital money has been see-sawing spectacularly.
Such pyrotechnics could hardly have escaped the attention of scammers, which is why cryptocurrency fluctuations have gone hand in hand with all kinds of stories.

These include hacked exchanges, Bitcoin and Monero ransoms, and, of course, hidden mining.
The fifth US Department of Defense bug bounty program, launched with HackerOne, will target a DoD enterprise system used by millions.