Home Tags Hacking

Tag: Hacking

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the ‘hacker’ as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people’s computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.

And have some cyber goodness too – just don't mention the Belgacom hack Great Britain, which is buying the US-made F-35 fighter jet, is urging European neighbour Belgium not to buy the US-made F-35 fighter jet.…
Pair partly responsible for largest bank-card theft ring in American history Two Russian criminals have been sent down in America after pleading guilty to helping run the largest credit-card hacking scam in US history.…
For years, a quintet of hackers penetrated large companies, raking in millions.
The U.S.

Air Force conducted a 20-day bug bounty challenge in which 106 vulnerabilities were disclosed and patched.
Participants managed to secure themselves over $103,000 in rewards.
New 'HaoBao' campaign also plants the seeds for additional espionage on targeted machines.
Pwned credit-score biz quietly admits more info lost Last year, Equifax admitted hackers stole sensitive personal records on 145 million Americans and hundreds of thousands in the UK and Canada.…
The 2018 Winter Olympics opening ceremonies were briefly impacted when servers belonging to Olympic organisers were hacked.
Public release of exploit could be a long way off, though.
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.
At first, it looked like wersquo;d found a zero-day local privilege escalation vulnerability for Windows, but the sample that was triggering Exploit Checker events turned out to be the clean signed executable file, part of the multiplayer online game.