Quantcast
Channel: Hackers
Browsing latest articles
Browse All 42 View Live

Image may be NSFW.
Clik here to view.

Tip of the Week: What to Do When Passwords “Don’t Cut the Mustard” Anymore

Virtually every kind of online account requires a password. Yet, due to the aggressive nature of hackers, passwords alone are no longer enough to protect your information. The best way to approach...

View Article



Image may be NSFW.
Clik here to view.

Are Vigilante Hackers a Threat?

2015 was a brutal year for major corporations, as one by one they fell victim to hacking attacks. Major organizations like Blue Cross Blue Shield, Anthem, and even the United States Office of Personnel...

View Article

Image may be NSFW.
Clik here to view.

Tip of the Week: Think You’ve Been Hacked? Here are 5 Ways to Check

Any business that deals with online technology needs to be aware of the dangers that come with the territory. Hackers are more common nowadays than ever before, and organizations that don’t take a...

View Article

Image may be NSFW.
Clik here to view.

This Hacker Stole 1.17 Billion Credentials. You Won’t Believe How Much He...

In a bizarre reminder of why security best practices are so critical to the world of IT, it has been reported that one of the largest collections of hacked and stolen login details are currently making...

View Article

Image may be NSFW.
Clik here to view.

FBI Issues Warning About Critical Infrastructure Getting Hacked

There aren’t many instances of hackers targeting physical infrastructure, but the few that make themselves known tend to be quite catastrophic. Take, for example, the devastating cyber attack on the...

View Article


Image may be NSFW.
Clik here to view.

Scammers Use Whaling Attack Emails to Pose as Upper Management

The average business owner may already be aware of what are called phishing attacks - scams that attempt to deceive and trick users into handing over sensitive credentials. However, not all phishing...

View Article

Image may be NSFW.
Clik here to view.

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been...

View Article

Image may be NSFW.
Clik here to view.

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing...

View Article


Image may be NSFW.
Clik here to view.

Shhhh! Library of Congress Hacked

Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the...

View Article


Image may be NSFW.
Clik here to view.

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were...

View Article

Image may be NSFW.
Clik here to view.

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In...

View Article

Image may be NSFW.
Clik here to view.

A Zombified Botnet is as Scary as it Sounds

Botnets are proving to be a difficult hurdle for security professionals, and it’s easy to understand why. Distributed Denial of Service attacks that can knock down servers or services, as well as...

View Article

Image may be NSFW.
Clik here to view.

Forget Reading Data, These Ingenious Hackers Listen to Data

Computing systems are always vulnerable to some obscure hack or another, and researchers are always trying to find ways to shore them up and prevent future attacks. One previously undiscovered hack...

View Article


Image may be NSFW.
Clik here to view.

Too Many Smart Devices Have Dumbed-Down Security Protocols

In both the home and the business, security cameras are becoming more and more commonplace as a means of preserving security. However, some malware can turn these devices, and others, into cyber...

View Article

Image may be NSFW.
Clik here to view.

The Most Popular Domains Make the Biggest Targets for Email Spoofing

Let’s say that you receive an email from a software vendor, say, Microsoft. When you are contacted by a major company like this, do you automatically assume that it’s secure, or are you skeptical that...

View Article


Image may be NSFW.
Clik here to view.

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the...

View Article

Image may be NSFW.
Clik here to view.

Charity Scams Are Very Real. Here’s How To Dodge Them

Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless...

View Article


Image may be NSFW.
Clik here to view.

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for...

View Article

Image may be NSFW.
Clik here to view.

Is Your Security Prepared to Stop a DDoS Attack?

If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering...

View Article

Image may be NSFW.
Clik here to view.

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company....

View Article
Browsing latest articles
Browse All 42 View Live




Latest Images