With the incremental efficiencies we gain with each new technology, there is also incremental potential for hackers to exploit the newfound vulnerabilities introduced. Fortunately, as the Internet of Things (IoT) advances, so does the knowledge of the many vulnerabilities discovered – many of which are hopefully remedied before they make hacking headlines. So what IoT… Read More »
Drone Hacking Taken To New Heights
Hacking Over the Internet, Wirelessly, and From the AirHacking is achieved in many forms. One might think of hackers breaking into computer networks remotely over the internet to shut down critical infrastructure. This has been proven out with the Stuxnet hacking of Iran’s nuclear reactor where it suffered a major blow when the U.S. and Israel… Read More »
IoT Hackers Are Just High-Tech Cat Burglars
Keeping our families and homes safe is essential in this uncertain world we live in. I often find myself double checking my deadbolt, alarm, and lights before I leave home. Yes, I am one of those paranoid home owners that put the alarm stickers on every window, and of course, I make sure no newspapers… Read More »
Why Are So Many Prison Calls Being Recorded and Stored?
On November 11th an anonymous hacker leaked records of more than 70 million calls stolen from Securus Technologies. Securus provides phone service to land line phones in jails and prisons across the country, covering 1.2 million inmates. The Intercept examined 37 gigabytes of leaked data and found it consisted of databases that included the prisoners’… Read More »
Is a serial hacker stalking Rutgers University?
Since spring of 2014, Rutgers has been targeted by a hacker or group of hackers in a series of distributed denial of service (DDoS) attacks. A DDoS attack uses a network of compromised computers called a botnet to access the targeted site simultaneously. The increase in traffic overwhelms the targeted network and causes it to… Read More »
How Can Military Drones Be So Vulnerable to Hacking Attacks?
United States military and intelligence agencies are increasingly relying on unmanned aerial vehicles but these military drones have long been an attractive target for hackers. And lately, it seems as though the hackers are gaining entrance more easily. How is this possible? In 2011 a CIA drone was captured by Iranian hackers who managed to… Read More »
What’s The Best Way To Steal Credit Info? Hack A Credit Processing Company Like Experian
On October 1st T-Mobile released a statement revealing approximately 15 million existing and potential customers had their personal identification data stolen. The hack was not against T-Mobile itself but against Experian, the company that runs credit verification for postpaid accounts for T-Mobile. What Was Stolen? According to T-Mobile, anyone who submitted a credit application between… Read More »
Why Non-Cheaters Should Be Just As Worried As Ashley Madison Members
Millions of accounts stolen from the adultery facilitation service Ashley Madison hit the dark web this week, causing angst for spouses, anxiety for the site’s users and social reflection from a variety of media sources. The information includes names, passwords, email addresses, credit card information for paid accounts, physical descriptions and profile information about users’… Read More »
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 8
- Next Page »