You searched for hackers/ | SC Media

Your search for hackers/ returned 732 results

Your search for hackers/ returned 732 results

Sort Results:

Relevant Recent
Sponsor Content

Game on: Why hackers hack

Theft of sensitive data, ranging from employee and customer information to intellectual property, remains at the epicenter of the battle between threat actors and the organizations responsible for protection. Consumers and businesses alike are sharing more data across an ever-expanding digital landscape that includes the cloud, mobile, IoT and more. So, organizations are increasingly challenged…
Israel comes under cyber attack
Cybercrime, Election Coverage, Government, Security News

Report: Israel examines hacker’s claim of voter registry breach

Israeli authorities are reportedly investigating a hacker’s claims on Twitter that he successfully breached the country’s voter registry in the days leading up to tomorrow’s 2019 legislative election. Nicknamed DarkCoder, the hacker contended in a Saturday tweet that he stole information on 6 million Israeli voters, even posting a picture displaying victims’ names identity numbers…
Executive Insight, Opinion, Security News

How to be an ethical hacker

At first glance, the term “ethical hacking” may seem like an oxymoron. That’s because criminal “hacker” has become a pejorative that’s closely tied to the bad guys — black hat threat actors looking to steal or corrupt data or other assets within digital reach. The truth is, there are plenty of good guys in the…
Perspectives

Navigating through the mind of a 2020 hacker

When someone gets notified that they have been impacted by a data breach, many people picture a hooded figure in a dark basement with lines of code streaming across a computer screen. Contrary to popular belief, cyberattacks are rarely carried out by a sophisticated cyber-assassin looking to destroy a business. Most of the time they…
Huawei responds to allegations of NSA hacking
APTs/cyberespionage, Mobile Security, Mobile/End Point Security, Security News

Huawei meeting with bug bounty hackers

Huawei, the subject of a U.S. government ban amid allegations that China might force the company to spy on others, will reveal a bug bounty program for its mobile devices and new HarmonyOS operating system, to top phone hackers in Munich during a secret meetup Nov. 16. The tech company is likely trying to convince…
Security News, Vulnerabilities

CMS hackers focus on WordPress

WordPress continued to be the most attacked content management system (CMS) attracting an even higher percentage of CMS centered cyberattacks in 2018, according to a new Sucuri report. WordPress, which holds a 60 percent market share in the CMS space, was the focus of 90 percent of the attacks, up from 83 percent in 2017,…
The DOJ to investigate Uber breach
Security News, Vulnerabilities

Uber pays out $375K in bug bounties during challenge in London

Uber laid out $375,000 to bug bounty hunters during a live hacking event held in London with partner HackerOne. The bounties, which ranged from $500 to $50,000 each, were handed out in real-time during the eight-hour event that brought more than 50 hackers together to hunt for vulnerabilities. “Working with hackers to find and resolve…
Government, Phishing, Privacy & Compliance News and Analysis, Security News

Twitter hackers accessed direct messages for 36 accounts

The hackers who ran a cryptocurrency scam using high-profile, verified Twitter accounts, including those belonging to Joe Biden, Apple, Bill Gates, Uber and Barack Obama, accessed the direct messages (DMs) of 36 accounts and downloaded account data from eight accounts via “Your Twitter Data.” There is no indication that the DMs of any former or…
Power plant Russia
Security News

Hackers pounce on honeypot gateway to a ‘power station’

While the cybercrime ecosystem usually conjures a 21st Century online bazaar for buying and selling credit card numbers, some hackers possess loftier goals. Attackers stepped into a honeypot environment that was set up by Cybereason to emulate a gateway to a power substation of a major electricity provider in the U.S. shortly after credential became…
Cybercrime, IoT, Network Security, Security News

Fearing backlash, IoT hacker ‘TheHackerGiraffe’ no longer sticking neck out for PewDiePie

The hacker who’s taken credit for compromising connected devices such as printers and smart televisions in support of YouTube star PewDiePie has gone dark, apparently due to fears of prosecution as well as death threats. According to multiple reports, the individual known as TheHackerGiraffe deleted his (or her/their) accounts on Twitter, Cloudflare, Patreon and other…
Next post in Cybercrime