Skip to main content
  1. Home
  2. hacker

hacker

A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Double-check that job posting — hackers are spreading malware through them

A new phishing scam is using Indeed emails and Microsoft 365 login pages to dupe unsuspecting executives.
Microsoft Teams

Hackers are sending malware through seemingly innocent Microsoft Teams messages

An Illustration shows a programmer busy with a laptop and several monitors.

FBI disables Russian malware operation targeting foreign governments

A laptop opened to the ChatGPT website.

Great, hackers are now using ChatGPT to create malware

A depiction of a hacker breaking into a system via the use of code.

Hack involved the data of a nation’s entire population

A depiction of a hacked computer sitting in an office full of PCs.

Hackers are hiding a nasty secret in James Webb telescope images

A Starlink dish next to an RV.

Elon Musk’s Starlink satellites hacked by $25 homemade device

A depiction of a hacker breaking into a system via the use of code.

North Korean hackers target huge crypto exchange — are user funds safe?

A large monitor displaying a security hacking breach warning.

U.S. federal court system cyberattack is worse than previously thought

A depiction of a hacked computer sitting in an office full of PCs.

This anti-hacker group helps you escape ransomware for free

A depiction of a hacker breaking into a system via the use of code.

Hackers now exploit new vulnerabilities in just 15 minutes

A depiction of a hacker breaking into a system via the use of code.

Hacker steals 1 billion people’s records in unprecedented data breach

A depiction of a hacker breaking into a system via the use of code.

Hackers targeted AMD to steal huge 450GB of top-secret data

A data extortion group known as RansomHouse has asserted that it has stolen upwards of 450GB of sensitive data from AMD.
A social security card in shrink-wrap paper.

This hacker site sold 24 million people’s data — until now

An underground illegal online marketplace that contained and sold sensitive information pertaining to individuals based out of the U.S. has been shut down.
Close-up of hands on a laptop keyboard in a dark room.

Microsoft responds to hack of Cortana and Bing source code

A hacking group has hit Microsoft's DevOps repositories and posted the source code for Cortana and other projects.
Person typing on a computer keyboard.

70,000 Nvidia employees reportedly affected by recent hack

The cyberattack that affected Nvidia might have revealed the personal login data of over 70,000 employees, according to a monitoring website.
Privacy security stock photo.

Microsoft warns of latest malware attack, explains how to avoid secret backdoor

Microsoft recently discovered FoggyWeb, a new malware currently being used by attackers.
how to unlock your iphone use with another carrier t mobile hq sign feat 720x720

T-Mobile hacker lambastes carrier’s security measures

A person claiming to have conducted the recent hack affecting more than 54 million people linked to T-Mobile has described the carrier’s security as awful.
T-Mobile storefront with corporate signage.

T-Mobile investigating claims of massive hack involving customer data

T-Mobile says it's investigating claims that hackers have stolen data belonging to as many as 100 million of its customers.
teflon water supply dangerous faucet

Hacker tries to poison the water supply of a Florida city

A computer hacker tried to poison the water supply of a Florida city, local police revealed on Monday, February 8.
hacked smart appliances legitimate concerns feature panasonic microvawe  2 min

Should you worry about hacked smart home appliances?

As smart appliances continue to evolve, the potential for them to be hacked becomes greater. We spoke with a cybersecurity expert who sheds light on the risks.
smart home defense against hackers photo of person typing on computer keyboard 735911

Without a firewall, the door to your smart home is left wide open

Your smart home could be hacked, but you wouldn't even know it. Protect your all your devices against them with a hardware firewall.
pixel 4 xl screen vs pixel 3 xl screen

Google’s Android bug bounty program announces a $1 million prize

Google has announced a potential top payment of $1M as part of its Android bug bounty program. Bug hunters are encouraged to search for a particular kind of security issue linked to the Pixel phone’s Titan M chip. Google’s Android bug bounty program started in 2015, with the single biggest payment so far worth $160K.
ransomware

Hackers can easily watch your every move, control PCs with free NanoCore Trojan

You might want to make sure you're up and running with the latest version of Windows and your antivirus software. Researchers have discovered a very dangerous remote access trojan (RAT), which if your PC is not fully patched and updated, could leave even amateur hackers in complete control of your PC.
how to protect yourself from capital one data breach credit card

Lawsuit over Capital One data breach could eventually get you sweet revenge

The Miami-based law firm Colson Hicks Eidson has filed a class-action lawsuit against Capital One Financial Corporation “for negligence in failing to safeguard consumers’ personal information” in the recent data breach that impacted 100 million consumers.
researcher warns smart speakers can be hacked to emit harmful noise man with fingers in ears

Oh great, now our smart speakers can attack us with harmful sounds

A security researcher has said it’s surprisingly easy to take over Wi-Fi and Bluetooth speakers and get them to emit harmful sounds. With a few lines of code and a vulnerable device, Matt Wixey said it’s possible to play sounds that can annoy and intimidate those within earshot, or even damage their hearing.
AMD Ryzen 5 2400G & Ryzen 3 2200G Review pins

Spectre looms again as another exploit leaves Intel CPUs vulnerable

Intel CPUs have once again required a software patch from operating system developers due to a speculative execution exploit. These bugs have plagued Intel CPUs for years, requiring fixes that can lead to performance degradation by several percentage points in a number of different software scenarios.
Privacy security stock photo.

After fourth attack, hacker puts personal records of 26M people up for sale

A hacker going by the name of Gnosticplayers is selling the personal data of 26 million people who have been using the services of six different companies.The information is up for sale on the dark web for a value of up to 1.4231 bitcoin, or around $4,940. This is Gnosticplayers' fourth hack.
canon pixma printers printer

Someone is selling a mass-hacking service, leaving your printer exposed

Hackers normally try to take control or manipulate your computer, but internet-connected printers are also at risk. That is all according to a report from Vice, which finds that someone attempted to sell a mass printing service, which could cause your printer to spit out any given message on command.
Steam Link App

Hacker finds Steam bug that unlocks free games, collects $20K for reporting it

Security researcher Artem Moskowsky discovered a Steam bug that allowed him to generate infinite free keys for any game on the digital distribution. However, instead of abusing the exploit and selling the keys to pirates, Moskowsky reported the issue to Valve, which gave him a $20,000 reward.
Razer Blade (2018) using keyboard

Your body heat can help attackers steal your password in new attack

Hackers have a new way to steal your login by looking at heat traces left behind on each key using a $400 FLIR infrared camera. Touch typists are less susceptible to this type of attack than those who hunt and peck at each key, but those who type with acrylic nails are virtually immune to this type of password theft.
what is bitcoin mining

Cryptojacking hackers infected 400 major websites with stealth miners

Coinhive's javascript cryptocurrency miners have been found installed on more than 400 websites that contained a vulnerability in the Drupal content management system. The cryptojackers behind it have made off with heaps of cryptocurrency off of the backs of unwitting website owners and visitors.
cube for generating passwords dsc00042

Use this Rubik’s Cube-style device to create ultra-secure computer passwords

Even with all the high-profile hacks that have been in the news, lots of people continue to fail to keep themselves protected online by using passwords that are not secure. Fortunately, a new Kickstarter campaign is here to help -- courtesy of a Rubik's Cube-style device for generating secure passwords.
iot

Hackers broke into a casino’s high-roller database through a fish tank

With connected devices multiplying every year, security flaws are increasing as well. Once hackers get a toehold into your network, they can use it to steal valuable data, as a casino found out with the aquarium thermostat in its lobby.