MUO

Hacking

Page 11

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
protect-against-ddos 1
How Can You Protect Yourself Against a DDoS Attack?

DDoS attacks – a method used to overburden Internet bandwidth – seem to be on the rise. We show you how you can protect yourself from a distributed denial of service attack.

By 
 1
The Top Wikipedia Articles of 2015, Music Streaming Is the Future... [Tech News Digest]

The most-read Wikipedia entries of 2015, how streaming beat downloads in 2015, the end of Windows 8, Sony tries to trademark the term "Let's Play", and how a simple mod makes GTA V more entertaining.

By 
google-block-hack-howto 1
Should Websites That Explain How to Hack Be Blocked by Google?

Following major security breaches, it is often suggested that Google should remove all information about hacking — then no one can learn how to hack, job done! Here's why that's a terrible idea.

By 
online-security-privacy-2015 1
What We Can Learn from 2015's Online Security & Privacy Challenges

As 2015 draws to a close, let's reflect upon the security lessons we learned in 2015. From Ashley Madison, to hacked kettles, and dodgy security advice from the government, there's a lot to talk about.

By 
 1
The Biggest Apps of 2015, Why the iPhone's Camera Is So Good... [Tech News Digest]

Google and Facebook own us all, Apple has too many employees, the error code denoting Internet censorship, hacking Hello Kitty fans, and Saturday Night Live mocks flaming hoverboards.

By 
child-hacker 1
Is Your Child a Hacker? The British Authorities Think So

The NCA, Britain's FBI, has launched a campaign to deter young people from computer crime. But their advice is so broad that you could assume anyone reading this article is a hacker - even you.

By 
 1
VTech Gets Hacked, Apple Hates Headphone Jacks... [Tech News Digest]

Hackers expose VTech users, Apple considers removing the headphone jack, Christmas lights can slow down your Wi-Fi, Snapchat gets into bed with (RED), and remembering The Star Wars Holiday Special.

By 
 1
Apple Rejects Mac iPad Hybrid , Snapchat Sells Paid Lenses... [Digest]

Apple isn't planning a Surface clone, Snapchat wants you to buy Lenses, Microsoft kills Zune, Turkey blocks Reddit, and Mission Impossible finally gets a dose of reality.

By 
 1
5 Unstoppable Drone Security Threats You Should Be Aware Of

Drones introduce a host of new security concerns that governments and legislation have yet to react to. We have compiled five quadcopter drone-related threats that are particularly worrying.

By 
 1
Apple Removes Ad-Blocking Apps, Netflix Hikes Prices... [Tech News Digest]

Apple deletes hacker-friendly apps, Netflix ups its prices, Amazon battles Etsy, the Harry Potter series lands on iBooks, Sony announces PS4 price cut, and RoBoHoN is the weirdest smartphone you'll ever see.

By 
password-test 1
Test Your Password Strength with the Same Tool Hackers Use

Is your password secure? Tools that assess your password strength have poor accuracy, meaning that the only way to really test your passwords is to try to break them. Let's look at how.

By 
vulnerabilites-disclosure 1
Full or Responsible Disclosure: How Security Vulnerabilities Are Disclosed

Security vulnerabilities in popular software packages are discovered all the time, but how are they reported to developers, and how do hackers learn about vulnerabilities that they can exploit?

By 
gaming-network-hack 1
Why Gaming Network Hacks Prove The Need for Two Factor Authentication

Can I have a hacker breaking into PSN/XBL/Steam/all three? usual Matrix-style code thing, but with the logos in the background, perhaps?

By 
companies-security-breach 1
Why Companies Keeping Breaches a Secret Could be a Good Thing

With so much information online, we all worry about potential security breaches. But these breaches could be kept secret in the USA in order to protect you. It sounds crazy, so what's going on?

By 
 1
Hackers Target Babies, Google Fun Facts!... [Tech News Digest]

Hackers spy on babies, Google kills your curiosity, Hulu drops the ads, Cortana translates your nonsense, Obama loves selfie sticks, and an honest look at Metal Gear Solid.

By 
 1
Apple Plans to Produce Movies, Android Wear on iOS... [Tech News Digest]

Apple makes move into movies, Apple powers Android Wear, Ashley Madison lives on, Giffiti adds GIFs, and the Back to the Future trilogy distilled down to its barest bones.

By 
2015-security-threats 1
The 6 Most Dangerous Security Threats of 2015

Cyber-attacks continue to grow in 2015, with 425,000,000 malware attacks in circulation. Of this vast amount, some is more important than others. Here's our rundown of the five most significant so far this year….

By 
ashleymadison-serious 1
3 Reasons Why The Ashley Madison Hack Is A Serious Affair

The Internet seems ecstatic about the Ashley Madison hack, with millions of adulterers' and potential adulterers' details hacked and released online, with articles outing individuals found in the data dump. Hilarious, right? Not so fast.

By 
 1
Ashley Madison Suicides, Get Cortana for Android... [Tech News Digest]

Ashley Madison offers a reward, Cortana lands on Android, Russia rags on Wikipedia, Kadenze offers online courses, Rockstar Editor comes to consoles, and a mad ad for Madden NFL 16.

By 
car-security 1
VW Sued Researchers to Conceal Security Flaw for Two Years

Security researchers are usually thanked (or even rewarded) when vulnerabilities are found. But Volkswagen slapped a gag order on researchers who discovered how easy it was to hack a keyless car system.

By 
9 10 11 12
Page 11 / 12