Hackers Took Control Over Israeli Army’s Twitter Account For A While

Hackers Took Control Over Israeli Army’s Twitter Account For A While

Earlier we have seen hackers breaching into many government sites and leaking many vital documents and information. However, lately it’s been reported that hackers took control over Israeli Army’s Twitter account for a while and posted some false messages.

By On July 5, 2014 Respond
Add To Bookmark Add To Readlist  
Read How A Hacker Nabbed $600,000+ In Two Months By Googling People’s Home Networks

Read How A Hacker Nabbed $600,000+ In Two Months By Googling People’s Home Networks

It is said that hacking is an art. Sometimes a hacker does something so brilliant that we can’t help but marvel at it. However, lately we’ve come to know that a hacker has nabbed $600,000+ in two months just by Googling people’s home networks!

By On June 19, 2014 Respond
Add To Bookmark Add To Readlist  
Russian Hackers Behind Ransomware For Apple Devices Arrested

Russian Hackers Behind Ransomware For Apple Devices Arrested

Ransomware is a malicious piece of software which locks access to a device, seeking a certain amount of ransom in order to unlock it. Russians authorities have now arrested two hackers who have been behind numerous ransomware attacks targeted at Apple devices.

By On June 11, 2014 Respond
Add To Bookmark Add To Readlist  
New Hack Offers ‘Quiet Facebook’ By Hiding The News Feed

New Hack Offers ‘Quiet Facebook’ By Hiding The News Feed

Many of us are perpetually overwhelmed and annoyed at the endless flood of information and data that our Facebook News Feed is. A new hack allows you to hide the News Feed altogether, letting you enjoy a quieter Facebook experience.

By On May 25, 2014 Respond
Add To Bookmark Add To Readlist  
WooThemes Issues Warning To Customers Over Security Breach

WooThemes Issues Warning To Customers Over Security Breach

Over the past few days, WooThemes has been looking into its servers investigating a possible breach of credit card data. Recent updates from the company show that a number of user accounts had indeed been compromised and their credit cards might have misused.

By On May 10, 2014 Respond
Add To Bookmark Add To Readlist  
Bitly Gets Hacked, Asks Users To Change Passwords

Bitly Gets Hacked, Asks Users To Change Passwords

In another episode of the security breach of a major online service, Bitly was recently hacked and its user credentials compromised. The company has since sent out an alert, prompting its users to change their passwords.

By On May 10, 2014 Respond
Add To Bookmark Add To Readlist  
AOL Asks Millions Of Users To Reset Passwords Following Security Breach

AOL Asks Millions Of Users To Reset Passwords Following Security Breach

Security breaches have become a very important thing in the online world. AOL has now alerted millions of its users, asking them to reset their passwords as a precautionary measure in the wake of a recent security breach.

By On April 30, 2014 Respond
Add To Bookmark Add To Readlist  
Facebook Released New Programming Language Named Hack

Facebook Released New Programming Language Named Hack

Social media leader Facebook has released a new open-source language called Hack. It integrates with the ever-popular language PHP and it’ll allow Facebook engineers write code faster while more easily avoiding common programming errors.

By On March 25, 2014 Respond
Add To Bookmark Add To Readlist  
Massive Credit Card Breach Occurs At California DMV

Massive Credit Card Breach Occurs At California DMV

High profile credit card heists are becoming increasingly common. The California Department of Motor Vehicles (DMV) has now revealed the breach of credit cards, alerting numerous banks about it.

By On March 23, 2014 Respond
Add To Bookmark Add To Readlist  
Students Hack Siri To Make It Support Third-Party Apps

Students Hack Siri To Make It Support Third-Party Apps

Siri is the best voice-based virtual assistant that is commercially available on mobile devices today. But it’s limited to only a few apps, which is annoying. A group of students have now devised an excellent solution to overcome this limitation.

By On March 6, 2014 Respond
Add To Bookmark Add To Readlist  
300,000 Computers Compromised By Two London IP Addresses

300,000 Computers Compromised By Two London IP Addresses

It has been discovered that a range of widespread router exploits have been used by two London IP addresses to compromise nearly 300,000 computers globally.

By On March 5, 2014 Respond
Add To Bookmark Add To Readlist  
KickStarter Breached, Customer Data Stolen By Hackers

KickStarter Breached, Customer Data Stolen By Hackers

It has become somewhat of a routine to come across at least one high-profile hacking incident every month or so. This time it’s KickStarter which was recently breached by hackers who were then able to steal the data of an unknown number of customers.

By On February 16, 2014 Respond
Add To Bookmark Add To Readlist  
This $20 Device Can Hack Any Smart Car!

This $20 Device Can Hack Any Smart Car!

Smart cars are becoming increasingly common as more and more auto vendors use built-in computer systems in their vehicles. Security researchers have now devised an iPhone-sized $20 device which can essentially hack into any smart car.

By On February 9, 2014 Respond
Add To Bookmark Add To Readlist  
Yahoo Mail Usernames And Passwords Hacked, Yet Again

Yahoo Mail Usernames And Passwords Hacked, Yet Again

When it comes to major email service providers, Yahoo stands out as a company which often runs into security hazards. The company has now revealed that the usernames and passwords of an unknown number of Yahoo Mail users have been stolen and are being used to hack into their accounts.

By On January 31, 2014 Respond
Add To Bookmark Add To Readlist  
Russian Hackers Target Hundreds Of Energy Companies Worldwide

Russian Hackers Target Hundreds Of Energy Companies Worldwide

China has long been accused of backing its army of hackers in their numerous cyber espionage attempts. A report now reveals that Russian government may be playing a similar role, supporting a group of hackers who have targeted hundreds of energy companies globally.

By On January 23, 2014 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook