From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
hacking in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
Online security experts vpnMentor have investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device, highlighting how easily it could be tampered with.
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
More than 100 members of the Israel Defense Forces, the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices.
Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account.
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.
A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack...
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
One of the more popular events at Microsoft’s TechEd, ‘HackEd’ saw Auckland’s SKYCITY Theatre packed almost to the last seat with developers and professional techies. Everyone in attendance was there to watch Kirk Jackson (Xero) and Andy Prow (Aura I...
Whitepapers about hacking
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Videos about hacking
Latest News Articles
- Evercade review: A charming cartridge-based handheld for retro gaming enthusiasts
- Samsung Galaxy Note 20 Ultra vs S20 Ultra: Which ultimate flagship should get all of your money?
- What remote learning will look like this fall in Meet, Teams, and Zoom
- Android users now have a personal earthquake detector right on their phone
- macOS Big Sur: The new Battery system preference
Most Popular Articles
- 1 HP Envy x360 13: An affordable laptop with Ryzen 4000 and other perks
- 2 The Samsung Galaxy Tab S7+ delivers iPad Pro-level hardware—but Android (or DeX) is no iPadOS
- 3 3 reasons to spend $1,000 on the Samsung Galaxy Note 20, and 3 reasons not to
- 4 Samsung Galaxy Note 20 vs iPhone 11 Pro: This $1,000 spec showdown has a clear winner
- 5 How to get a free pair of Samsung USB-C earbuds if you buy a Galaxy Note 20
Join the newsletter!
- Why do gamers like RGB Lights?
- Sonos Arc review: The Main Event
- Umurangi Generation review: Evangelion Meets Pokémon Snap
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?