Hacking

Hacking news, analysis, how-to, opinion and video. | CIO


Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

The dark web's changed
video

How the dark web has gone corporate

Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.

csan 001 top 15 security breaches
video

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees.

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

wannacry ransom screenshot

Will macOS protect you from ransomware attacks?

The recent WannaCry ransomware attacks on Windows have some Mac users wondering if they are safe. Is macOS secure from ransomware attacks?

wannacry ransom screenshot

WannaCry: Sometimes you can blame the victims

Last week’s big malware outbreak caused a lot of damage, but organizations that made good decisions ahead of time weren’t affected.

img 20170512 173142 01

The WannaCry ransomware might have a link to North Korea

As security researchers investigate last Friday’s massive attack from the WannaCry ransomware, they’ve noticed clues that may link it with a North Korean hacking group that has been blamed for attacking banks across the world.

img 20170515 140831 01

Paying the WannaCry ransom will probably get you nothing. Here's why.

Last Friday’s massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom? Those who do shouldn't expect a quick response -- or any response at all. Even after payment, the...

nsa aerial

Microsoft blames US stockpiled vulnerability for ransomware attack

Microsoft on Sunday said a software vulnerability stolen from the U.S. National Security Agency has affected customers around the world, and described the spread of the WannaCrypt ransomware on Friday in many countries as yet another...

img 20170512 095943

Old Windows PCs can stop WannaCry ransomware with new Microsoft patch

Users of old Windows systems can now download a patch to protect them from this week’s massive ransomware attack.

img 20170512 173142 01

A 'kill switch' is slowing the spread of WannaCry ransomware

Friday’s unprecedented ransomware attack may have stopped spreading to new machines -- at least briefly -- thanks to a "kill switch" that a security researcher has activated.

Hewlett Packard

HP rolls out patch to fix keylogging bug in certain laptops

Consumers with HP laptops that have been accidentally recording their keystrokes can easily address the problem with a patch from the PC maker.

img 20170512 095943

A ransomware attack is spreading worldwide, using alleged NSA exploit

A ransomware strain appears to be spreading worldwide, by leveraging a hacking tool that may have come from the U.S. National Security Agency.

Hewlett Packard

Certain HP laptops are found recording users' keystrokes

Over two dozen HP laptop models may have secretly been recording users’ keystrokes by mistake, according to a Swiss security firm.

170511 trump

Trump pushes US government to the cloud with cybersecurity order

President Trump has finally signed a long-awaited executive order on cybersecurity, which calls for the U.S. government to move to the cloud and modernize its IT infrastructure.

170509 securitykeys 1

How to protect your Google and Facebook accounts with a security key

Security keys offer a more secure alternative to code-based two-factor authentication.

botnet

New IoT malware targets 100,000 IP cameras via known flaw

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products.

Load More