Email
Password
Remember meForgot password?
    Log in with Twitter

Hackers News

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

Lev Lesokhin discusses CAST's system-level analysis platform Special

The massive data breach disclosed by Equifax earlier this month has created more questions than answers, leading many businesses to reassess their own data security measures.

Hackers have broken into the core systems of energy companies

Hackers are targeting U.S. and European energy companies in a cyber espionage campaign that has in some cases successfully broken into the core systems that control the companies’ operations, according to researchers at the security firm Symantec.

Shipping industry at risk of cyberattacks by hackers and pirates

Hackers are increasingly targeting shipping firms to extract business information, attempt audacious frauds and steal goods from vessels. Members of the security industry warned shipping firms are often unaware of the dangers.

Microsoft sees cyberattacks as part of the 'fabric of society'

Microsoft has warned that artificial intelligence could "reset" cybercrime and the techniques used to combat it. AI is being used to tackle emerging threats but is also powering a new generation of malware created by elite attackers.

Obama's cybersecurity advisor: We need to tackle 'statecraft'

Obama's former cyber advisor Michael Daniel has said we need to reconsider our approach to cybersecurity. He called for more companies to share information about common threats as states and governments step up their use of cyberattacks.

U.S. nuclear power plants have been hacked, reports DHS

Washington D.c. - Russia's meddling in the 2016 U.S. presidential election is small potatoes compared to what the FBI and Department of Homeland Security (DHS) revealed Thursday night. Allegedly, Russian hackers have been targeting our nuclear power plants.

CIA-hired hackers could make up to $150k a year

Hackers hired by the CIA and other government agencies could be making up to $150,000 per year. The pay for top-level engineers is higher and scales up to $200,000. A range of bonuses are available too, aiming to keep developers locked in.

Random number generation poses hacker challenge

The best way to protect sensitive systems from hackers is to use a cryptographic key. For this lock to work it needs to use numbers chosen at random without any structure. This is difficult but a new system is at hand.

Hackers find way to hijack PCs using malicious subtitle files

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.

Cell phones charging are at greatest risk from hackers

Cell phones, as with websites and other forms of communications equipment, are at risk from hacking. A major vulnerability arises with smartphones when they are charging, according to a new study from the New York Institute of Technology.

Hackers set off 156 tornado warning sirens in Dallas

Hackers set off all of Dallas' emergency warning sirens in a weekend cyberattack. The large sirens blared out for over an hour at midnight on Friday, continuing into early Saturday morning. Eventually, city officials took the entire network offline.

Op-Ed: Trump ‘selling’ the internet? How naive can you get?

Sydney - A report is circulating that the Trump administration wants to sell the Internet to corporate interests to control internet access. 30 years ago, that might have been possible. Now, it’s about as dumb as you can get.

Hackers use a clever fake email attachment to access accounts

A new email scam is circulating that aims to trick the user into giving up their email login details by sending over a (fake) link to a PDF to open.

Hackers can force your monitor to permanently display images

Security researchers have demonstrated a technique that allows hackers to manipulate the pixels of computer monitors to change the displayed image. It could allow a new breed of malware to emerge, fooling users by displaying messages that bypass their PC.

Apple finally has a bug bounty program, offers $200k rewards

Apple has announced it is forming a bug bounty program in September with rewards up to $200,000. Apple is the last major tech company to offer such a scheme. Despite its late entrance, it has been praised by security experts for accepting external help.

Decades-old Windows bug leaks your Microsoft account to the world

Hackers have uncovered a major flaw in Windows that has been present in every released version since Windows 95. It is still exploitable in Windows 10 and could reveal your username and password, including your email address, to the world.

Experts warn of hackers adopting ransomware at 'alarming' rates

The number of ransomware attacks faced by PC users is rising at an "alarming" rate, according to security experts who study the increasingly popular class of malware.

Passwords of seven million Minecraft players being sold online

The passwords to over seven million user accounts owned by members of a popular Minecraft community have been hacked and are now being offered for sale on the dark net. The community, Lifeboat, didn't notify users until three months after the breach.

Maryland hospital hacked with ransomware, FBI suspects inside job

Baltimore - A Samsam ransomware virus infected the MedStar Web server of the Baltimore's Union Memorial Hospital, in Maryland. The malware has been launched from within, according to the Federal Bureau of Investigation (FBI) reports.

Hackers post private data of America's largest police union

Personal online files from the largest police union in the U.S. were leaked online Thursday after a hacker breached the website of the Fraternal Order of Police (FOP).

Twitter goes down affecting millions of users around the world

Shock and disappointment to millions: Twitter went down this morning and people across the globe are up in arms. The site is not accessible through desktop or mobile services.

Electronic Health Records: a gold rush for data thieves

The United States continues to present the largest market of “soft targets” for identity thieves. As security upgrades continue to roll out among America’s millions credit cards, identity thieves are taking the path of least resistance to stay busy

Time Warner Cable: Up to 320,000 email passwords possibly stolen

Time Warner Cable Inc. reported Wednesday that email passwords for up to 320,000 customers may have been stolen. The company also said it hasn't determined how the information was harvested, but there no indications of a breach at Time Warner Cable.

Hackers replace ISIS site with Viagra ad and message to calm down

A group associated with the famed hacker collective Anonymous has a message for ISIS, which it promptly displayed by taking down one of the terror organization's sites. A message, it appears, in the form of an advertisement for Viagra, and a suggestion.

Hackers say ISIS is planning attack at WWE 'Survivor Series'

Atlanta - Anonymous, an online activist/hacker group, said the terrorist group ISIS is planning an attack at WWE 'Survivor Series,' which is being held on Sunday evening.

French researchers find a way to hack Siri from 16 feet away

Google Now can take orders from hackers across the room. Not only can this be done with Google Now, but hackers can do the same thing with Siri.

Toronto police: Two unconfirmed suicides over Ashley Madison hack

Toronto - At least two people may have committed suicide, and a number of "hate crimes" have been reported because of the hacking of the Ashley Madison website, Toronto police said on Monday.

Review: Genius and curiosity go unrewarded in this week’s releases Special

This week’s releases include Disney’s version of instant gratification; a new TV series from an Oscar-winning director; a couple of clandestine, small screen operations that risk exposure; and an inventive horror picture.

Hackers steal data of 2.4 million Carphone Warehouse customers

Carphone Warehouse announced last Wednesday that hackers might have gained access to personal data of almost 2.4 million customers as one of the company's Information Technology (I.T.) systems in the U.K. came under attack.
  1 2 3 4 5 6 ... 7 Next»

Set up a news alert for

Hackers


Hackers Image

Conventionable X-Ray of an implantable cardioverter-defibrillator.
Conventionable X-Ray of an implantable cardioverter-defibrillator.
Unknown
The team who made the electric virtual reality chair experience are seen here busily working on thei...
The team who made the electric virtual reality chair experience are seen here busily working on their prototype at PeopleSpace in Irvine, CA.
Untitled
hackronomicon.com
Beware  computer viruses. Many computer users don t update anti-virus software
Beware, computer viruses. Many computer users don't update anti-virus software
Kacper Pempel / Reuters
Syrian Electronic Army tweets after hacking @AP
Syrian Electronic Army tweets after hacking @AP
Twitter screen capture
An artificial pacemaker (serial number 1723182) from St. Jude Medical  with electrode.
An artificial pacemaker (serial number 1723182) from St. Jude Medical, with electrode.
Steven Fruitsmaak
The  mascot  for the hacker group Lulz Boat
The 'mascot' for the hacker group Lulz Boat
Lulz Boat logo
Anonymous with Guy Fawkes masks at Scientology in Los Angeles.
Anonymous with Guy Fawkes masks at Scientology in Los Angeles.
Vincent Diamante
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
This image shows two different kinds of devices used for the remote monitoring of pacemaker patients...
This image shows two different kinds of devices used for the remote monitoring of pacemaker patients. The one on the left, the gray device, is the more advanced device that actually communicates with the pacemaker through the peripherial that is placed over the pacemaker in the patient's chest. The device on the right is an older version of remote monitoring device. It requires the use of a telephone handset.
Richardelainechambers
Untitled
Screen Capture
Anonymous hacker group s photo
Anonymous hacker group's photo
Anonymous hacker group/facebook
Members of Anonymous protest a Scientology  church
Members of Anonymous protest a Scientology "church"
Wired
Untitled
Don Hankins
Untitled
Thomas Samson, AFP/File
Untitled
Loic Venance, AFP/File
A protester at Occupy Wall Street dons the visage of Guy Fawkes  that has become a universal symbol ...
A protester at Occupy Wall Street dons the visage of Guy Fawkes, that has become a universal symbol of resistance to any perceived tyranny and is associated with the hacking group Anonymous.
David Shankbone
Untitled
A. Magill
Untitled
FT