Email
Password
Remember meForgot password?
    Log in with Twitter

Hackers News

Q&A: How you hold your phone can help protect it from hackers Special

How someone holds their phone is becoming a criteria for securing their identity from hackers. If you usually hold it with your right hand, and a left-handed hacker is trying to gain access to your phone, they can be stopped because of that difference.

TrendMicro report looks at how to trap malicious attackers

Trend Micro released a report documenting a six-month investigation to help inform a protection strategy for industrial environments. The focus is with developing strategies to trap malicious attackers.

Landry’s Inc hacked despite end-to-end encryption Special

Landry’s Inc., a restaurant and hospitality corporation that owns popular eateries such as McCormick and Schmick’s, Rainforest Cafe and Del Frisco’s, was infected by malware that infected its order-entry systems to steal customer payment card inform

Q&A: DomainTools — 2019 cybersecurity report card survey Special

DomainTools have recently issued their third annual Cybersecurity Report Card survey in which security analysts, threat hunters and other cyber professionals self-grade the security posture of their organizations. We examine the findings.

Top expert cybersecurity predictions for 2020 Special

From the growth in mobile access and muti-channel experiences to new threats from hackers, 2020 looks to be a tricky year for IT professionals tasked with delivering robust cybersecurity. Experts from OneSpan provide analysis.

Now hackers are breaking into Ring cameras Special

News has broken of a Ring camera being hacked and allowing the attacker to speak to a eight-year-old girl in her bedroom. Will LaSala, Director of Security Solutions, Security Evangelist at OneSpan tells Digital Journal about the risks.

Q&A: When hackers have your healthcare IT department outgunned Special

Keeping on top of regulations is a burdensome task for any healthcare IT department, including HIPAA compliance, especially when cash-strapped or low in headcount. So what can they do? Max Pruger of Kaseya has some answers.

Moscow-linked hackers hit anti-doping agencies: Microsoft

Paris - A hackers group linked to Moscow has targeted sporting and anti-doping organisations across the world with "significant" cyberattacks as anti-doping authorities mull new allegations against Russia.

Six key security predictions for businesses for 2020 Special

Cybersecurity issues have been on the increase during 2019 and 2020 shows no sign of these slowing down. Indeed, the number of issues facing businesses is actually set to increase, according to Anurag Kahol of Bitglass.

Many malicious apps identified in new iPhone threat Special

A recent report from Wandera has identified 17 apps from one developer that load a malicious clicker trojan module on an iOS device. Sam Bakken, Senior Product Marketing Manager, OneSpan looks into the issue.

iPhone flaw shows ongoing concerns with mobile devices Special

Researchers working at Google’s Project Zero have discovered several hacked websites which used cybersecurity flaws to indiscriminately attack any iPhone that visited them. This is the biggest attack yet reported against iPhone users.

Q&A: Digital browser identities and the new illicit trade Special

IntSights has released the company’s research brief “Digital Browser Identities: The Hottest New Black Market Good” which provides an overview of the Richlogs marketplace and the digital identities market. Ariel Ainhoren provides the details.

Q&A: Hackers are sharing your digital data on the dark web Special

Trade in digital data, especially data that reveals are person's or company's digital identity is becoming big business on the dark web, according to Ariel Ainhoren of InSights.

Highly dangerous hacking group targeting U.S. electric grid

Xenotime, a group of hackers that has previously targeted oil and gas companies, has been targeting the U.S. electric grid in recent months, according to new research released Friday by cybersecurity group Dragos.

I'm hatin' it — McDonalds app users hacked by hamburglar

Montreal - For the past several months, hamburglars have been on the loose in Canada, hacking into mobile phone user's McDonald's apps. They have hijacked people's accounts and ordered hundreds of dollars of food for themselves.

New report into the extent of identity fraud released

Financial analysts Experian have released their annual “Global Identity & Fraud Report”. As well as highlighting concerns, the report indicates that consumers are willing to share more data with companies if this means enhanced security.

Hackers crack vein authentication security

Hackers have constricted a fake hand out of wax and used this to show the weaknesses in vein authentication software. The software, which scans the vein patterns in hands and compares them to stored images, is not as robust as security experts thought.

Russian hackers went after conservative US groups: Microsoft

Washington - Russian government hackers tried to hijack the websites of conservative US think tanks, Microsoft said Tuesday, raising fresh alarms over widening efforts by Moscow to sow discord in US politics.

Russian hackers went after conservative US groups: Microsoft

Washington - The Russian hacking unit that tried to interfere in the US presidential election has been targeting conservative US think tanks, Microsoft said.

Global hotel room doors were vulnerable to hacking

The majority of electronic hotel door locks worldwide were vulnerable to hacking, according to a new assessment. This raised several security concerns. The vulnerability now appears to have been resolved.

Hackers demanding bitcoin ransom attack Atlanta city computers

Washington - Hackers demanding ransom payable in bitcoin have attacked computers of the Atlanta city government in the southern US state of Georgia, officials say.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

Lev Lesokhin discusses CAST's system-level analysis platform Special

The massive data breach disclosed by Equifax earlier this month has created more questions than answers, leading many businesses to reassess their own data security measures.

Hackers have broken into the core systems of energy companies

Hackers are targeting U.S. and European energy companies in a cyber espionage campaign that has in some cases successfully broken into the core systems that control the companies’ operations, according to researchers at the security firm Symantec.

Shipping industry at risk of cyberattacks by hackers and pirates

Hackers are increasingly targeting shipping firms to extract business information, attempt audacious frauds and steal goods from vessels. Members of the security industry warned shipping firms are often unaware of the dangers.

Microsoft sees cyberattacks as part of the 'fabric of society'

Microsoft has warned that artificial intelligence could "reset" cybercrime and the techniques used to combat it. AI is being used to tackle emerging threats but is also powering a new generation of malware created by elite attackers.

Obama's cybersecurity advisor: We need to tackle 'statecraft'

Obama's former cyber advisor Michael Daniel has said we need to reconsider our approach to cybersecurity. He called for more companies to share information about common threats as states and governments step up their use of cyberattacks.

U.S. nuclear power plants have been hacked, reports DHS

Washington D.c. - Russia's meddling in the 2016 U.S. presidential election is small potatoes compared to what the FBI and Department of Homeland Security (DHS) revealed Thursday night. Allegedly, Russian hackers have been targeting our nuclear power plants.

CIA-hired hackers could make up to $150k a year

Hackers hired by the CIA and other government agencies could be making up to $150,000 per year. The pay for top-level engineers is higher and scales up to $200,000. A range of bonuses are available too, aiming to keep developers locked in.

Random number generation poses hacker challenge

The best way to protect sensitive systems from hackers is to use a cryptographic key. For this lock to work it needs to use numbers chosen at random without any structure. This is difficult but a new system is at hand.
  1 2 3 4 5 6 ... 8 Next»

Set up a news alert for

Hackers


Hackers Image

The team who made the electric virtual reality chair experience are seen here busily working on thei...
The team who made the electric virtual reality chair experience are seen here busily working on their prototype at PeopleSpace in Irvine, CA.
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
Beware  computer viruses. Many computer users don t update anti-virus software
Beware, computer viruses. Many computer users don't update anti-virus software
Kacper Pempel / Reuters
Cybercriminals can find a  safe  space to operate in dark web marketplaces  according to researchers
Cybercriminals can find a "safe" space to operate in dark web marketplaces, according to researchers
Robyn Beck, AFP/File
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
A protester at Occupy Wall Street dons the visage of Guy Fawkes  that has become a universal symbol ...
A protester at Occupy Wall Street dons the visage of Guy Fawkes, that has become a universal symbol of resistance to any perceived tyranny and is associated with the hacking group Anonymous.
David Shankbone
An artificial pacemaker (serial number 1723182) from St. Jude Medical  with electrode.
An artificial pacemaker (serial number 1723182) from St. Jude Medical, with electrode.
Steven Fruitsmaak
Online hackers have taken credit for an online service outage of Sony's PlayStation and Microso...
Online hackers have taken credit for an online service outage of Sony's PlayStation and Microsoft's Xbox game consoles on December 25, 2014
Stephane de Sakutin, AFP/File
United Airlines has awarded two hackers one million frequent-flier miles each for finding bugs in th...
United Airlines has awarded two hackers one million frequent-flier miles each for finding bugs in the company's computer systems.
Anastacia
Untitled
Photo by Jefferson Santos on Unsplash
Untitled
Don Hankins (CC BY 2.0)
Twitter down: Social network suffers outage.
Twitter down: Social network suffers outage.
© 2016 Twitter
Anonymous hacker group s photo
Anonymous hacker group's photo
Anonymous hacker group/facebook
Untitled
Thomas Samson, AFP/File
Overcrowding in California State Prison.
Overcrowding in California State Prison.
California Department of Corrections
Syrian Electronic Army tweets after hacking @AP
Syrian Electronic Army tweets after hacking @AP
Twitter screen capture
Untitled
Screen Capture
The  mascot  for the hacker group Lulz Boat
The 'mascot' for the hacker group Lulz Boat
Lulz Boat logo
Untitled
PSFK
A Russian national accused of hacking into US retail computer systems was arrested and ordered to fa...
A Russian national accused of hacking into US retail computer systems was arrested and ordered to face criminal charges, officials said Monday
Thomas Samson, AFP/File

Latest News
Top News