MUO

Hacking

Page 3

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Ethereum, Bitcoin, Ripple, Monero logos seen over a photo showing trading graphs on computers 1
Why Do Crypto Companies Keep Getting Hacked?

Cryptocurrency exchanges have lost millions through security breaches in the past decade. So why are they such a huge target for hackers?

By 
An anonymous cybercriminal, wearing a hoodie, working at a laptop. The scene is dark and the criminal facing us has a large question mark in front of their face. 1
How Do Hackers Make Money, Legally and Illegally?

You're probably picturing a shady hacker stealing your personal information. But how do they actually make money, both illegally and legally?

By 
last pass logo in front of padlock and key 1
Customer Data Accessed in LastPass Password Manager Breach

LastPass has announced that customer data was accessed in a security breach, marking the company's second hack in 2022.

By 
Row of pay phones on a wall 1
Pay Phones Are Coming Back in Philadelphia Thanks to Linux, No Quarters Required

An "amateur phone collective" is making creative use of Linux and special hardware to help people without cellphones stay connected.

By 
Man writing code on a laptop computer 1
What Are Bug Bounty Programs? Here's Everything You Need to Know

Have you found a flaw in a system or product? Want to know how ethical hackers actually make money? That's where bug bounties come in.

By 
anonymous hooded figure on laptop hidden by question mark 1
42,000 Imposter Domains Used by Chinese Hackers in Huge Phishing Campaign

Thousands of imposter domains are being used in a massive brand impersonation phishing campaign.

By 
Man in Green Hoodie and Black Sunglasses Sitting on Orange Chair 1
What Is Credential Stealing? How to Prevent It on Windows

Credential stealing can leave you completely exposed, so wat actually is it? What can you do about it? Here's what you need to know.

By 
xbox controller in hands 1
RapperBot Malware Used to Launch DDoS Attacks on Game Servers

An updated version of RapperBot malware is being used to carry out DDoS attacks on game servers.

By 
black and white wordpress graphic 1
Over 15,000 WordPress Sites Affected in Malicious SEO Campaign

Over 15,000 WordPress websites have been compromised and redirected to fake portals to increase spam website traffic.

By 
gold bitcoin being split into fragments 1
US Justice Department Seizes $3.36 Billion in Stolen Bitcoin

Billions of dollars worth of Bitcoin have been seized years after it was stolen from the dark web's "Silk Road".

By 
dropbox logo in front of skull shaped computer code 1
Dropbox Suffers Data Breach After Phishing Attack

Dropbox has suffered a data breach wherein an attacker stole 130 GitHub repositories.

By 
wordpress logo with japanese keyword hack 1
How to Fix the Japanese Keyword Hack on WordPress and Secure Your Site

"Why is my browser showing Japanese?!" If you search for your own blog and see Japanese text, you might've fallen victim to this annoying hack...

By 
various cables leading to a router 1
5 Simple Ways to Improve Your Router and Modem Security

Yes, router security really matters. Here's why hackers target routers and what you can do to keep your device safe.

By 
anonymous masked man taking photos 1
4 Cheap Ways to Protect Yourself From Hackers in Public

Do you use your laptop or smartphone in public? Everyone does! So how can you protect yourself from cybercriminals when you're away from home?

By 
picture of duck in pond behind white alert symbol  1
Facebook Business Accounts Hacked via New PHP Version of Ducktail Malware

A PHP version of the Ducktail infostealer malware is being used to compromise Facebook Business accounts.

By 
black and white close up shot of smartphone 1
Android Found to Be Leaking Data Even with VPN On

It has been stated that Android is leaking Wi-Fi connection data despite the use of a VPN.

By 
a hacker with glasses and a mask on 1
How Your Phone Can Be Hacked Remotely and What You Can Do to Stop It

Think all the data on your phone is safe in your pocket? Think again. Here's how hackers can subvert your phone remotely.

By 
hooded person behind matrix symbols and microsoft exchange logo 1
LockBit Ransomware Deployed via Windows Exchange Server Hack

Cybercriminals have reportedly exploited a Microsoft zero-day vulnerability to hack Exchange servers.

By 
login credentials being stolen from laptop via phishing 1
New Phishing-as-a-Service Tool Poses Significant Risks

A new phishing-as-a-service tool is making data theft that much easier for cybercriminals.

By 
hooded person and fractured background behind discord logo 1
Hackers Exploit Beeple Discord Server to Drain Wallets

The Beeple Discord server has been hacked by malicious actors attempting to drain user wallets.

By 
1 2 3 4 5
Page 3 / 12