Email
Password
Remember meForgot password?
    Log in with Twitter

Hackers News

Landry’s Inc hacked despite end-to-end encryption Special

Landry’s Inc., a restaurant and hospitality corporation that owns popular eateries such as McCormick and Schmick’s, Rainforest Cafe and Del Frisco’s, was infected by malware that infected its order-entry systems to steal customer payment card inform

Q&A: DomainTools — 2019 cybersecurity report card survey Special

DomainTools have recently issued their third annual Cybersecurity Report Card survey in which security analysts, threat hunters and other cyber professionals self-grade the security posture of their organizations. We examine the findings.

Top expert cybersecurity predictions for 2020 Special

From the growth in mobile access and muti-channel experiences to new threats from hackers, 2020 looks to be a tricky year for IT professionals tasked with delivering robust cybersecurity. Experts from OneSpan provide analysis.

Now hackers are breaking into Ring cameras Special

News has broken of a Ring camera being hacked and allowing the attacker to speak to a eight-year-old girl in her bedroom. Will LaSala, Director of Security Solutions, Security Evangelist at OneSpan tells Digital Journal about the risks.

Q&A: When hackers have your healthcare IT department outgunned Special

Keeping on top of regulations is a burdensome task for any healthcare IT department, including HIPAA compliance, especially when cash-strapped or low in headcount. So what can they do? Max Pruger of Kaseya has some answers.

Moscow-linked hackers hit anti-doping agencies: Microsoft

Paris - A hackers group linked to Moscow has targeted sporting and anti-doping organisations across the world with "significant" cyberattacks as anti-doping authorities mull new allegations against Russia.

Six key security predictions for businesses for 2020 Special

Cybersecurity issues have been on the increase during 2019 and 2020 shows no sign of these slowing down. Indeed, the number of issues facing businesses is actually set to increase, according to Anurag Kahol of Bitglass.

Many malicious apps identified in new iPhone threat Special

A recent report from Wandera has identified 17 apps from one developer that load a malicious clicker trojan module on an iOS device. Sam Bakken, Senior Product Marketing Manager, OneSpan looks into the issue.

iPhone flaw shows ongoing concerns with mobile devices Special

Researchers working at Google’s Project Zero have discovered several hacked websites which used cybersecurity flaws to indiscriminately attack any iPhone that visited them. This is the biggest attack yet reported against iPhone users.

Q&A: Digital browser identities and the new illicit trade Special

IntSights has released the company’s research brief “Digital Browser Identities: The Hottest New Black Market Good” which provides an overview of the Richlogs marketplace and the digital identities market. Ariel Ainhoren provides the details.

Q&A: Hackers are sharing your digital data on the dark web Special

Trade in digital data, especially data that reveals are person's or company's digital identity is becoming big business on the dark web, according to Ariel Ainhoren of InSights.

Highly dangerous hacking group targeting U.S. electric grid

Xenotime, a group of hackers that has previously targeted oil and gas companies, has been targeting the U.S. electric grid in recent months, according to new research released Friday by cybersecurity group Dragos.

I'm hatin' it — McDonalds app users hacked by hamburglar

Montreal - For the past several months, hamburglars have been on the loose in Canada, hacking into mobile phone user's McDonald's apps. They have hijacked people's accounts and ordered hundreds of dollars of food for themselves.

New report into the extent of identity fraud released

Financial analysts Experian have released their annual “Global Identity & Fraud Report”. As well as highlighting concerns, the report indicates that consumers are willing to share more data with companies if this means enhanced security.

Hackers crack vein authentication security

Hackers have constricted a fake hand out of wax and used this to show the weaknesses in vein authentication software. The software, which scans the vein patterns in hands and compares them to stored images, is not as robust as security experts thought.

Russian hackers went after conservative US groups: Microsoft

Washington - Russian government hackers tried to hijack the websites of conservative US think tanks, Microsoft said Tuesday, raising fresh alarms over widening efforts by Moscow to sow discord in US politics.

Russian hackers went after conservative US groups: Microsoft

Washington - The Russian hacking unit that tried to interfere in the US presidential election has been targeting conservative US think tanks, Microsoft said.

Global hotel room doors were vulnerable to hacking

The majority of electronic hotel door locks worldwide were vulnerable to hacking, according to a new assessment. This raised several security concerns. The vulnerability now appears to have been resolved.

Hackers demanding bitcoin ransom attack Atlanta city computers

Washington - Hackers demanding ransom payable in bitcoin have attacked computers of the Atlanta city government in the southern US state of Georgia, officials say.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

Lev Lesokhin discusses CAST's system-level analysis platform Special

The massive data breach disclosed by Equifax earlier this month has created more questions than answers, leading many businesses to reassess their own data security measures.

Hackers have broken into the core systems of energy companies

Hackers are targeting U.S. and European energy companies in a cyber espionage campaign that has in some cases successfully broken into the core systems that control the companies’ operations, according to researchers at the security firm Symantec.

Shipping industry at risk of cyberattacks by hackers and pirates

Hackers are increasingly targeting shipping firms to extract business information, attempt audacious frauds and steal goods from vessels. Members of the security industry warned shipping firms are often unaware of the dangers.

Microsoft sees cyberattacks as part of the 'fabric of society'

Microsoft has warned that artificial intelligence could "reset" cybercrime and the techniques used to combat it. AI is being used to tackle emerging threats but is also powering a new generation of malware created by elite attackers.

Obama's cybersecurity advisor: We need to tackle 'statecraft'

Obama's former cyber advisor Michael Daniel has said we need to reconsider our approach to cybersecurity. He called for more companies to share information about common threats as states and governments step up their use of cyberattacks.

U.S. nuclear power plants have been hacked, reports DHS

Washington D.c. - Russia's meddling in the 2016 U.S. presidential election is small potatoes compared to what the FBI and Department of Homeland Security (DHS) revealed Thursday night. Allegedly, Russian hackers have been targeting our nuclear power plants.

CIA-hired hackers could make up to $150k a year

Hackers hired by the CIA and other government agencies could be making up to $150,000 per year. The pay for top-level engineers is higher and scales up to $200,000. A range of bonuses are available too, aiming to keep developers locked in.

Random number generation poses hacker challenge

The best way to protect sensitive systems from hackers is to use a cryptographic key. For this lock to work it needs to use numbers chosen at random without any structure. This is difficult but a new system is at hand.

Hackers find way to hijack PCs using malicious subtitle files

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.

Cell phones charging are at greatest risk from hackers

Cell phones, as with websites and other forms of communications equipment, are at risk from hacking. A major vulnerability arises with smartphones when they are charging, according to a new study from the New York Institute of Technology.
  1 2 3 4 5 6 ... 8 Next»

Set up a news alert for

Hackers


Hackers Image

Overcrowding in California State Prison.
Overcrowding in California State Prison.
California Department of Corrections
The  mascot  for the hacker group Lulz Boat
The 'mascot' for the hacker group Lulz Boat
Lulz Boat logo
Conventionable X-Ray of an implantable cardioverter-defibrillator.
Conventionable X-Ray of an implantable cardioverter-defibrillator.
Wikipedia (CC BY 3.0)
Voice of America website hacked by Iranian Islamists
Voice of America website hacked by Iranian Islamists
FreeMediaOnline.org
A Russian national accused of hacking into US retail computer systems was arrested and ordered to fa...
A Russian national accused of hacking into US retail computer systems was arrested and ordered to face criminal charges, officials said Monday
Thomas Samson, AFP/File
Members of Anonymous protest a Scientology  church
Members of Anonymous protest a Scientology "church"
Wired
Anonymous with Guy Fawkes masks at Scientology in Los Angeles.
Anonymous with Guy Fawkes masks at Scientology in Los Angeles.
Vincent Diamante
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
Untitled
PSFK
A protester at Occupy Wall Street dons the visage of Guy Fawkes  that has become a universal symbol ...
A protester at Occupy Wall Street dons the visage of Guy Fawkes, that has become a universal symbol of resistance to any perceived tyranny and is associated with the hacking group Anonymous.
David Shankbone
United Airlines has awarded two hackers one million frequent-flier miles each for finding bugs in th...
United Airlines has awarded two hackers one million frequent-flier miles each for finding bugs in the company's computer systems.
Anastacia
Beware  computer viruses. Many computer users don t update anti-virus software
Beware, computer viruses. Many computer users don't update anti-virus software
Kacper Pempel / Reuters
Syrian Electronic Army tweets after hacking @AP
Syrian Electronic Army tweets after hacking @AP
Twitter screen capture
New technology is allowing predators to share information and abuse more easily  a report says
New technology is allowing predators to share information and abuse more easily, a report says
Thomas Coex, AFP/File
Cybercriminals can find a  safe  space to operate in dark web marketplaces  according to researchers
Cybercriminals can find a "safe" space to operate in dark web marketplaces, according to researchers
Robyn Beck, AFP/File
Air Force Cyber Command Center
Air Force Cyber Command Center
U.S. Air Force
Online hackers have taken credit for an online service outage of Sony's PlayStation and Microso...
Online hackers have taken credit for an online service outage of Sony's PlayStation and Microsoft's Xbox game consoles on December 25, 2014
Stephane de Sakutin, AFP/File
Untitled
Loic Venance, AFP/File
The team who made the electric virtual reality chair experience are seen here busily working on thei...
The team who made the electric virtual reality chair experience are seen here busily working on their prototype at PeopleSpace in Irvine, CA.

Latest News
Top News