MUO

Hacking

Page 4

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
hacking into an online account laptop 1
Here's What to Do When Your Password Manager Gets Hacked

Can password managers get hacked? And if so, should you be worried? Here's what steps you need to take.

By 
A Person Sitting on the Floor with Vr Goggles Using a Computer 1
What Are Disassociation Attacks?

This tactic can mean your data ends up in the hands of cybercriminals. So what is a disassociation attack and how can you protect yourself?

By 
microsoft-exchange-1 1
Hackers Take Over Microsoft Exchange Servers with OAuth Apps

Malicious attackers are using rogue OAuth apps to gain control of Microsoft Exchange servers and spread spam.

By 
Woman in Black Tank Top Using WiFi in Coffee Shop 1
What Is Wardriving? How to Protect Yourself

Wardriving is one of the risks you face when using public Wi-Fi, and your home network could be at risk too. Here is how to keep your data safe.

By 
money being stolen from person via laptop 1
Crypto Market Maker Wintermute Loses $160 Million to Hackers

U.K-based cryptocurrency market maker Wintermute has lost over $160 million via a hack, according to the company's CEO.

By 
Close-Up View of System Hacking 1
The 7 Stages of Hacking Explained

How do cybercriminals find out who to hack? And how do they actually hack a system and steal data? Here's what you need to know.

By 
blue matrix background behind steam logo 1
Steam Accounts at Risk in New Browser-in-Browser Attack

Malicious actors are now using a new technique to get their hands on Steam account credentials.

By 
hacking hackers deleting files 1
What Are Threat Actors and What Do They Want?

You might have heard the term, "threat actor", but what does it mean? Why do they threaten your online security? And how can you protect against them?

By 
hacking into bluetooth laptop smartphone coding 1
11 Bluetooth Attacks You Need to Know About

No, even your Bluetooth connection isn't safe from hackers! Here's how cybercriminals can target your Bluetooth-enabled devices.

By 
image of nebula behind malware graphic 1
Hackers Exploit James Webb Telescope Image to Spread Malware

One of the stunning James Webb telescope images is now being used by malicious actors to spread malware among devices.

By 
black and white photo of tiktok app on smartphone 1
TikTok Denies Security Breach After Claims It Has Been Hacked [UPDATED]

TikTok has denied claims that it has suffered a massive data breach, though speculation is still running rife.

By 
Man using his laptop and drawing pad in the office with a blonde woman 1
Everything You Need to Know About BlackArch Linux

BlackArch is a well-known penetration testing distribution based on Arch Linux, but not everyone is aware of the unique features that set it apart.

By 
Hacker at PC 1
Kali Linux 2022.3 Released With Major Hacking Tool Upgrades

The developers have also announced a new Discord server. What will happen to their IRC channel?

By 
solana spelled in scrabble pieces behind lock icon 1
Thousands of Solana Wallets Hacked and Drained in Multimillion Dollar Attack

Thousands of Solana wallets have been drained in an overnight exploit resulting in the theft of millions of dollars.

By 
person coding on laptop behind windows logo 1
LockBit Ransomware Exploits Windows Defender to Load Cobalt Strike

A type of ransomware known as "LockBit 3.0" is being used to deploy Cobalt Strike payloads via the Windows Defender command line tool.

By 
Image depicting servers in a cloud background. 1
How Russian Hackers Use Google Drive and Dropbox to Evade Detection

Learn how threat actors exploit legitimate cloud services and what you can do about it.

By 
cyberattacker on laptop 1
What Is a Gray Hat Hacker?

You may have heard of black and white hat hackers, but what does a gray hat hacker do? Let's find out.

By 
alert symbol in front of crypto statistics on smartphone 1
The FBI Warns Crypto Investors to Watch Out for Fraudulent Apps

The FBI is warning of fraudulent cryptocurrency apps that have stolen millions from investors.

By 
robin singing on branch 1
Researchers Warn of a Dangerous Raspberry Robin Worm Targeting Windows Users

Windows users need to be aware of a Raspberry Robin worm being spread via USB devices.

By 
North Korean dictator Kim Jong Un graphic with crypto logos in background 1
What Is the Lazarus Group? Is It Really Comprised of North Korean Hackers?

Suspected to be funded by the North Korean government, the Lazarus Group poses a threat to the whole world.

By 
2 3 4 5 6
Page 4 / 12