Here are top 10 hacking and hacktivist groups that changed the world like no one else. Hacking has grown massively in the...
It has now been proven that almost anyone and any company can get hacked including the firm that manufactures car breathalyzers. A...
Wearable activity tracking devices like those made by Fitbit were one of the hottest gifts this past holiday season and it appears...
Tech industry hits back at plans to create legal framework for hacking by spies, military and police. Tech companies including Apple, Microsoft,...
Look who’s back? The Dark Web Hacking Forum ‘Hell’ Just months after users speculated that the infamous dark web hacking forum, ‘Hell’ was...
The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance drones on the border. Small...
The UK’s digital spy agency, GCHQ, has admitted for the first time in court that it hacks computers, smartphones, and networks in the...
I intended originally for this series to contain only three posts, and in order to achieve that, this post is longer than...
Short Bytes: As we are making progress on the front of online security, the cybercriminals are competing head-to-head to target every device connected...
Short Bytes: After facing backlash over the “wildly inaccurate” accounts reported to Twitter, Anonymous has decided to switch to their area of...
In the wake of the Paris attacks, the vigilante hacker group Anonymous has declared war on so-called Islamic State using the internet...
PowerView is a PowerShell tool to achieve network information on Windows domains for cyber security services and ethical hacking training professionals. It...
After calling Anonymous ‘Idiots’ ISIS issues guidelines to its cronies to protect from hackers like Anonymous The Islamic State militant ISIL who...
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that...
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely...
The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin...
Short Bytes: Zerodium’s million dollar iOS 9 jailbreak bounty program has expired and it has resulted in a new iOS jailbreak. But,...
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the...
Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to...
Short Bytes: Even though the number of users aware about the basic security practices is increasing day-by-day, most of us are unaware...
Short Bytes: A 15-year-old has been arrested in Northern Ireland in connection with the cyber-attack on the TalkTalk’s website. This news of 15-year-old...