Hackers Took Control Over Israeli Army’s Twitter Account For A While

Hackers Took Control Over Israeli Army’s Twitter Account For A While

Earlier we have seen hackers breaching into many government sites and leaking many vital documents and information. However, lately it’s been reported that hackers took control over Israeli Army’s Twitter account for a while and posted some false messages.

By On July 5, 2014 Respond
Add To Bookmark Add To Readlist  
Read How A Hacker Nabbed $600,000+ In Two Months By Googling People’s Home Networks

Read How A Hacker Nabbed $600,000+ In Two Months By Googling People’s Home Networks

It is said that hacking is an art. Sometimes a hacker does something so brilliant that we can’t help but marvel at it. However, lately we’ve come to know that a hacker has nabbed $600,000+ in two months just by Googling people’s home networks!

By On June 19, 2014 Respond
Add To Bookmark Add To Readlist  
Russian Hackers Behind Ransomware For Apple Devices Arrested

Russian Hackers Behind Ransomware For Apple Devices Arrested

Ransomware is a malicious piece of software which locks access to a device, seeking a certain amount of ransom in order to unlock it. Russians authorities have now arrested two hackers who have been behind numerous ransomware attacks targeted at Apple devices.

By On June 11, 2014 Respond
Add To Bookmark Add To Readlist  
Hacker Locks Down Apple Devices Remotely And Demands Ransom

Hacker Locks Down Apple Devices Remotely And Demands Ransom

Typically, hackers install ransomware on a targeted machine with the help of a malware. But some Australian users have found that a hacker has used the ‘Find My iPhone’ feature to lock down their iPhone, iPad devices and Mac machines all at once.

By On May 27, 2014 Respond
Add To Bookmark Add To Readlist  
WooThemes Issues Warning To Customers Over Security Breach

WooThemes Issues Warning To Customers Over Security Breach

Over the past few days, WooThemes has been looking into its servers investigating a possible breach of credit card data. Recent updates from the company show that a number of user accounts had indeed been compromised and their credit cards might have misused.

By On May 10, 2014 Respond
Add To Bookmark Add To Readlist  
Teenager Arrested For Changing Grades By Hacking School Computers

Teenager Arrested For Changing Grades By Hacking School Computers

Hacking is done for a whole lot of reasons, but rarely do we see a hacker breaking into school computers simply to change grades. This was precisely the charge brought up against an 18-year-old Miami University student who was arrested.

By On May 7, 2014 Respond
Add To Bookmark Add To Readlist  
FBI Strikes Vengefully, Anonymous Hacker May Get 440 Years In Jail

FBI Strikes Vengefully, Anonymous Hacker May Get 440 Years In Jail

It has been repeatedly highlighted since the tragic death of Aaron Swartz that the current anti-hacking laws in U.S. are awfully overreaching. This is manifest yet again in the example of a hacker who stands to get up to 440 years in jail for cyberstalking.

By On May 2, 2014 1 Response
Add To Bookmark Add To Readlist  
Hacker Takes Over Baby Monitor, Shouts At The Baby

Hacker Takes Over Baby Monitor, Shouts At The Baby

Typically, hackers are lucid individuals with definite goals in their minds. But there are some hackers who screw with others’ lives for the sheer fun of it. Such a hacker recently took over a baby monitor in Ohio and started shouting at the baby.

By On April 30, 2014 Respond
Add To Bookmark Add To Readlist  
Canada Arrested The First Heartbleed Hacker

Canada Arrested The First Heartbleed Hacker

Yesterday, Royal Canadian Mounted Police announced that they had arrested a 19-year-old Ontario man for allegedly taking advantage of the Heartbleed bug to steal tax information from a government website.

By On April 17, 2014 Respond
Add To Bookmark Add To Readlist  
Ukrainian Hackers Take Down NATO Websites

Ukrainian Hackers Take Down NATO Websites

Cyber Berkut, a group of hacktivists based in Ukraine, has claimed responsibility for taking down several NATO sites recently. The group apparently did this as a retaliation to NATO’s intents of bringing Ukraine into its fold.

By On March 17, 2014 Respond
Add To Bookmark Add To Readlist  
KickStarter Breached, Customer Data Stolen By Hackers

KickStarter Breached, Customer Data Stolen By Hackers

It has become somewhat of a routine to come across at least one high-profile hacking incident every month or so. This time it’s KickStarter which was recently breached by hackers who were then able to steal the data of an unknown number of customers.

By On February 16, 2014 Respond
Add To Bookmark Add To Readlist  
Hackers Leak Credentials For Thousands Of FTP Sites

Hackers Leak Credentials For Thousands Of FTP Sites

Hackers have somehow laid their hands on the FTP credentials of thousands of websites, which include New York Times. These credentials are now being circulated in underground hacking forums.

By On February 15, 2014 Respond
Add To Bookmark Add To Readlist  
Hacker Creates An Air Hockey Robot Using A 3D Printer

Hacker Creates An Air Hockey Robot Using A 3D Printer

3D printer is now being used to create many things. Lately, a hacker named Jose Julio has used a 3D printer to create air hockey robot.

By On February 9, 2014 Respond
Add To Bookmark Add To Readlist  
This $20 Device Can Hack Any Smart Car!

This $20 Device Can Hack Any Smart Car!

Smart cars are becoming increasingly common as more and more auto vendors use built-in computer systems in their vehicles. Security researchers have now devised an iPhone-sized $20 device which can essentially hack into any smart car.

By On February 9, 2014 Respond
Add To Bookmark Add To Readlist  
Yahoo Mail Usernames And Passwords Hacked, Yet Again

Yahoo Mail Usernames And Passwords Hacked, Yet Again

When it comes to major email service providers, Yahoo stands out as a company which often runs into security hazards. The company has now revealed that the usernames and passwords of an unknown number of Yahoo Mail users have been stolen and are being used to hack into their accounts.

By On January 31, 2014 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook