Tag: hacking news

What You Need to Know About Voice Hacking

What You Need to Know About Voice Hacking

As technology advances, more weaknesses and vulnerabilities appear that hackers can use to take advantage of their victims, like phishing, voice hacking and more. Identity theft is one of the most damaging forms of cybercrime, and voice hacking is a subset of that. This kind of attack involves collecting or stealing audio samples that can …

+ Read More

How To Immediately Improve Your Cyber Security

How To Immediately Improve Your Cyber Security

Like the space race and nuclear proliferation a half-century ago, our generation is witnessing an arms race of global proportions. This time around, the battle lines aren’t clearly drawn between warring nations. Instead, this modern arms race is one of network technologies, with cyber criminals cracking and exploiting the security measures we implement to keep …

+ Read More

Are Your Wireless Gadgets Vulnerable to Hacking?

Are Your Wireless Gadgets Vulnerable to Hacking?

Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system, bring attention to problem areas, and hopefully allow companies to fix the issue in …

+ Read More

What You Need to Know About the Recent FBI Hack

What You Need to Know About the Recent FBI Hack

You know things are getting pretty bad when government agencies like the IRS and the Department of Homeland Security have experienced data breaches. Hackers were able to collect and make public the data records of nearly 10,000 Department of Homeland Security employees. Sadly, that’s not the end of it. The same hackers recently published the …

+ Read More

Malicious Code Discovered in the App Store

Malicious Code Discovered in the App Store

Apple is often lauded for its advanced and strict security measures when it comes to its computing platforms – including mobile. However, recent events show that no matter how secure a device is, hackers will always find a way. Apple officially confirmed that hackers have used a software development tool to push infected and malicious …

+ Read More

What We Can Learn From the Hacking Team Hack

What We Can Learn From the Hacking Team Hack

There is one word that strikes fear into the heart of government agencies and firms engaged in dealings of a secretive and questionable nature. “Hacktivism” has inspired decentralized groups of hackers dedicated to routing out unlawful espionage, corporate greed and human rights violations wherever they occur. And sometimes other hackers are the target of such …

+ Read More

What You Need to Know About the Latest Cyber Attacks

What You Need to Know About the Latest Cyber Attacks

Toward the end of 2013, mega retailer Target’s point-of-sale systems were hacked. Pundits say hackers gained access to the company’s networks after getting inside Target’s connected refrigeration system and then hopping over the network from there to steal sensitive customer information. When the dust settled, Target had to fork over $162 million. You might think …

+ Read More