Search: hack

More Results

Sort by: Relevance | Date
  • Chapter excerpt: Defending the enterprise from password hacking

    In this excerpt from 'Hacking for Dummies, Fourth Edition,' author Kevin Beaver looks at the dangers of password hacking and how to respond to them.

  • Femtocell security: Defending against a femtocell hack

    The risk of a femtocell hack is a real enterprise concern. Nick Lewis explains why and explores how to defend against an attack.

  • pharma hack

    The pharma hack is an exploit that takes advantage of vulnerabilities in WordPress or Joomla documents, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate...

  • EE routers vulnerable to ‘incredibly easy’ hack

    A flaw in EE’s broadband routers could leave user data vulnerable to hackers.

    Computer programmer Scott Helme claimed he...

  • LinkedIn halts Sell Hack plugin revealing email addresses

    Sell Hack has suspended functionality to reveal LinkedIn email addresses in response to a cease-and-desist order

  • Syrian hacking group breaches Microsoft Twitter accounts

    Attackers claiming to be members of the Syrian Electronic Army (SEA) hacktivist group hit two Microsoft Twitter accounts and a blog at the weekend.

    The attack comes less than two weeks after the group, which supports Syrian president...

  • Snapchat hack has users thinking twice

    A recent hack into Snapchat, the social media platform for photo sharing, has users thinking twice about giving personal information to these services.

  • The ideology of hacking

    Modern day information risk has evolved from amateur script kiddies, locked in their bedrooms at home seeking to outsmart their friends, to a highly organised and professional...

  • Despite Pwn2Own 2014 hacks, application sandboxing still critical

    For enterprise information security professionals, the Pwn2Own 2014 hacking contest produced a clear lesson that goes beyond any one vulnerability: Even the most hardened software is vulnerable, so prepare accordingly.

  • Research reveals widespread mobile app hacking

    The top 100 paid Android apps and 56% of the top 100 paid Apple iOS apps have been hacked, research has revealed

Search Again: