Email
Password
Remember meForgot password?
    Log in with Twitter

Hacking News

From cyberattacks to privacy issues: Top predictions for 2020 Special

From risks around cloud misconfiguration, to new and emerging threats by hackers, 2020 poses some real dangers to businesses. Chris DeRamus, CTO and co-founder, DivvyCloud provides an insight as to the challenges that next year presents.

Moscow-linked hackers hit anti-doping agencies: Microsoft

Paris - A hackers group linked to Moscow has targeted sporting and anti-doping organisations across the world with "significant" cyberattacks as anti-doping authorities mull new allegations against Russia.

2,000 Georgia websites hacked in cyber attacks

Tbili - Some 2,000 websites in Georgia, including those of the president, courts, and media were hacked in a massive cyber attack on Monday, officials and media said.

Six key security predictions for businesses for 2020 Special

Cybersecurity issues have been on the increase during 2019 and 2020 shows no sign of these slowing down. Indeed, the number of issues facing businesses is actually set to increase, according to Anurag Kahol of Bitglass.

Catch 22: Digital Transformation and its impact on cybersecurity

The development of technologies to support digital transformation offers many businesses benefits, but it brings cybersecurity risks. Many business leaders believe hackers are more advanced than software developers, according to a new study.

The reason behind the Samsung fingerprint spoof Special

A major weakness with Samsung devices was recently highlight - hackers can use screen protectors to allow for any fingerprint to be used to unlock any Samsung smartphone. Philipp Pointner, Chief Product Officer, Jumio provides analysis.

Hackers target UN humanitarian organizations: Lookout

San Francisco - Hackers are targeting United Nations and humanitarian aid workers with a scheme designed to trick members into revealing passwords, security researchers said Thursday.

North Korean spear-phishing campaign attacks U.S. firms Special

Several U.S. businesses have been targeted by a campaign seemingly to originate from North Korea and using the tactic of spear-phishing. The cyber-assault is sophisticated, using legitimate documents as the targets. Alexander García-Tobar explains more.

Q&A: Hackers access files from the sound of keystrokes Special

An alarming new report finds that hackers can crack a password by recording keystroke sounds and using software to work out the combinations that have been used. Expert Ivan Blesa looks into the issue.

Q&A: How cloud computing protects Canadians against hackers Special

Canadian firm NuData uses biometrics to confirm that a person online is really who they say they are, even if the password they’re using is correct. To discover more, Digital Journal spoke with Justin Fox who leads DevOps at NuData.

Major databreach exposes data on most of Ecuador's citizens Special

An Elasticsearch server has leaked personal data on almost all of Ecuador's citizens, including their family trees, and children, plus some financial records and car registration information. Anurag Kahol of Bitglass assesses the situation.

US puts sanctions on N.Korea hacking groups behind major thefts

Washington - The US Treasury on Friday placed sanctions on three North Korea government-sponsored hacking operations which it said were behind the theft of possibly hundreds of millions of dollars and destructive cyber-attacks on infrastructure.

Looking behind the tweet: Dorsey hack explained Special

Twitter CEO Jack Dorsey was recently hacked on his own platform. New information that the hacker or hackers leveraged a SIM swapping tactic has come to light. A leading expert explains how this has happened and how to address the security weakness.

Google reveals years-long 'indiscriminate' iPhone hack

Washington - Google security experts uncovered an "indiscriminate" hacking operation that targeted iPhones over a period of at least two years and used websites to implant malicious software to access photos, user locations and other data.

Q&A: Digital browser identities and the new illicit trade Special

IntSights has released the company’s research brief “Digital Browser Identities: The Hottest New Black Market Good” which provides an overview of the Richlogs marketplace and the digital identities market. Ariel Ainhoren provides the details.

Hacking of connected cars stands as a major security threat

Connected vehicles will need better security feature to avoid cyber-attack. A new report finds that connected cars are open to being hacked and this stands as a major security threat.

Ransomware continues to be the major threat to businesses

A new report from CyberScout finds that businesses are still facing a major threats from online attacks. The biggest of these risks remains ransomware, and the weaknesses are both technological and cultural.

Scotland Yard Twitter and emails hacked

London - London's Metropolitan Police apologised Saturday after its Twitter, emails and news pages were targeted by hackers and began pumping out a series of bizarre messages.

Bluetooth hair straighteners are in danger of being hacked

Hair straighteners may not be the fist item that comes to mind when hacking is mentioned, but as more and more devices become connected, anything that relies on digital technology carries a vulnerability.

France's lower house passes online hate speech law

Paris - French MPs on Tuesday passed a landmark law to fight online hate speech which will oblige social media networks to remove offending content in 24 hours and create a new button to enable users to flag abuse.

Ecuador court orders release of Swede linked to Assange

Quito - An Ecuador court ordered the release Thursday of a Swedish national with ties to WikiLeaks founder Julian Assange and who was accused of computer hacking, as his detention was deemed "arbitrary.

EU says 'Russian sources' tried to undermine European vote

Apo - EU officials said Friday that "Russian sources" stepped up a long-running disinformation campaign against the European Union in a bid to undermine the bloc's elections last month.

Radiohead defies hackers, releases trove of stolen music

London - Alternative rock legends Radiohead on Tuesday released an 18-hour trove of private recordings from their 1997 album "OK Computer" after getting hacked by someone seeking a ransom of $150,000 for the music.

Top Australian university reports vast, 'sophisticated' hack

Sydney - A top Australian university with close ties to the country's government and security services on Tuesday said it had been the victim of a vast hack by a "sophisticated operator" who gained access to 19 years of sensitive data.

EU adopts powers to respond to cyberattacks

Apo - The European Union on Friday adopted powers to punish those outside the bloc who launch cyberattacks that cripple hospitals and banks, sway elections and steal company secrets or funds.

Global $100 mln cybercrime gang busted

Den Haag - US and European police said Thursday they have smashed a huge international cybercrime network that used Russian malware to steal $100 million (89 million euros) from tens of thousands of victims worldwide.

Red Cross website hacked in latest Singapore cyber attack

Fpo - The Singapore Red Cross said Thursday its website had been hacked and the personal data of more than 4,000 potential blood donors compromised in the latest cyber attack on the city-state.

US indicts Chinese hackers over giant 2015 data breach

Washington - The US Justice Department announced Thursday the indictment of members of "an extremely sophisticated" Chinese hacking group that allegedly stole the personal information of more than 78 million people from health insurer Anthem in 2015.

Designing pacemakers that cannot be hacked

As medical device technology becomes more sophisticated, and is able to capture important data of clinical significance, so the risk that implantable devices could be hacked by a someone wishing to steal data or cause harm rises.

Julian Assange: a decade of stunning leaks of US secrets

Washington - The US government has regarded WikiLeaks founder Julian Assange as a dangerous national security threat ever since he and his organization opened a decade-long effort to expose US secrets -- from military files to embarrassing Democratic Party emails d...
  1 2 3 4 5 6 ... 16 Next»

Set up a news alert for

Hacking


Hacking Image

Screenshot from the Mr. Robot TV show
Screenshot from the Mr. Robot TV show
Courtesy USA Networks
Members of Anonymous protest a Scientology  church
Members of Anonymous protest a Scientology "church"
Wired
Untitled
flickr/Robert Scoble
Untitled
Andrew CABALLERO-REYNOLDS, AFP/File
File photo: Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that ...
File photo: Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down parts of the internet last year
DAMIEN MEYER, AFP/File
Untitled
Carlos E. Jean-Gilles
New Chinese operating system named NeoKylin OS  looks almost exactly like Windows XP.
New Chinese operating system named NeoKylin OS, looks almost exactly like Windows XP.
DJC
A still from the film We Are Legion about the Anonymous hacktivists
A still from the film We Are Legion about the Anonymous hacktivists
Courtesy Hot Docs
A screen shot of the Twitter account for the US Military Central Command  which was apparently hacke...
A screen shot of the Twitter account for the US Military Central Command, which was apparently hacked.
Screenshot
Heather Mills  the former Mrs McCartney  testifies to the Leveson Inquiry on February 9  2012.
Heather Mills, the former Mrs McCartney, testifies to the Leveson Inquiry on February 9, 2012.
A still from the film We Are Legion about the Anonymous hacktivists
A still from the film We Are Legion about the Anonymous hacktivists
Courtesy Hot Docs
Untitled
Thomas Samson, AFP/File
Untitled
Facebook
The logo to represent the hacking community LulzSec
The logo to represent the hacking community LulzSec
LulzSec logo
Runa Sandvik demonstrates for Wired how a TrackingPoint rifle can be hacked
Runa Sandvik demonstrates for Wired how a TrackingPoint rifle can be hacked
Wired/screenshot
From the implantable device (pacemaker)  data flows to the physician s office  or in the case of an ...
From the implantable device (pacemaker), data flows to the physician's office, or in the case of an implanted defibrillator, the data can go from the operating room to the physician programmer and on to the patient support network. But all aspects of the system are vulnerable.
WhiteScope
The CIA can infiltrate network traffic
The CIA can infiltrate network traffic
Negative Space / Pexels
Screenshot from the Mr. Robot TV show
Screenshot from the Mr. Robot TV show
Courtesy USA Networks
Online hackers have taken credit for an online service outage of Sony's PlayStation and Microso...
Online hackers have taken credit for an online service outage of Sony's PlayStation and Microsoft's Xbox game consoles on December 25, 2014
Stephane de Sakutin, AFP/File
Who watches you surf?
Who watches you surf?
Mikey G Ottawa

Latest News
Top News