From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
hacking in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
Online security experts vpnMentor have investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device, highlighting how easily it could be tampered with.
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
More than 100 members of the Israel Defense Forces, the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices.
Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account.
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.
A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack...
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
One of the more popular events at Microsoft’s TechEd, ‘HackEd’ saw Auckland’s SKYCITY Theatre packed almost to the last seat with developers and professional techies. Everyone in attendance was there to watch Kirk Jackson (Xero) and Andy Prow (Aura I...
Whitepapers about hacking
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Videos about hacking
Latest News Articles
- 4K Blu-ray support is dying on the PC. MakeMKV can help
- What the internet got wrong about AMD’s controversial Radeon RX 6500 XT
- The best Lenovo laptops
- Apple has an AirTag problem—here’s how to solve it
- MacUpdater review: Take the tedium out of updating your apps
Most Popular Articles
- 1 Wordle may be fixed, but the App Store is still a total mess
- 2 Forget the M2, the Mac needs these iPhone features first
- 3 Google is wrong. Apple’s iMessage is actually a failure
- 4 The best HomeKit-compatible smart plugs
- 5 Is the new Samsung Galaxy S21 FE 5G worth it?
Join the newsletter!
- This adorable AirTag is one of the rarest Apple devices ever made
- What laptop should I get? Top 12 things to consider
- Sonos Arc review: The Main Event
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?