Articles on Hacking

Displaying 141 - 160 of 216 articles

When the SWAT team bursts into your bedroom, it’s not only unpleasant but potentially deadly. Jason Eppink/Flickr

Doxxing, swatting and the new trends in online harassment

Two new forms of online harassment, 'doxxing' and 'swatting', are increasing in frequency. Here's how to protect yourself from them.
If you’ve been hacked or had your identity stolen, time is of the essence when it comes to minimising the damage. Image sourced from Shutterstock.com

The first 72 hours are critical for hacking victims

Preventing and responding to the hacking epidemic is not a problem for one group or organisation to solve. And what happens in the first 72 hours can make all the difference.
These days anyone can download the tools used for cyber crime. Ivan David Gomez Arce/Flickr

Hackers’ kit bag: the tools that terrorise the internet

Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Harnessing the quantum property of light takes security to the next level. Boris Skoric

Quantum physics can fight fraud by making card verification unspoofable

Decades of data security research have brought us highly reliable, standardized tools for common tasks such as digital signatures and encryption. But hackers are constantly working to crack data security…
Hacking and making a profit isn’t as easy as it looks. Reuters

Hard Evidence: how much is cybercrime really costing us?

In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
That poster’s all you’re gonna get. Justin Lane/EPA

Sony must release The Interview

Is The Interview a good movie? We may never know. After the theft by North Korean hackers of vast quantities of confidential emails, pay information and unreleased film scripts, the drip-drip leaking of…
The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution. Shutterstock

Personal privacy is eroding as consent policies of Google and Facebook evoke ‘fantasy world’

We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…

Top contributors

More