MUO

Hacking

Page 5

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Near Field Communication smartphones 1
How Does a Drive-By NFC Hack Work?

What is NFC, why is it on your phone, and does it present a security risk? Here's everything you need to know.

By 
Pharming Definition and Types 1
The World's Most Famous and Best Hackers (and Their Fascinating Stories)

White-hat hackers versus black-hat hackers. Here are the best and most famous hackers in history and what they're doing now.

By 
Hacker at desktop computer 1
Kali Linux 2022.2 Lands With Desktop Tweaks, Hilarious Hollywood-Hacking-Homaging Screensaver

The latest version of Kali Linux shows that developers like to kick back and have fun while developing powerful hacking tools.

By 
Google Search on phone 1
What Is Google Dorking and How Hackers Use It to Hack Websites

Hackers sometimes rely on Google dorking to hunt for sensitive information like usernames, log files, etc. Learn all about it to keep your site safe.

By 
Hacking Message on Laptop 1
Is Ethical Hacking Legal or Illegal?

Not all hackers are bad! White-hat, or ethical, hackers find vulnerabilities before cybercriminals can exploit them. But is ethical hacking legal?

By 
blue underwater image with lots of small bubbles 1
What Is Water Cybersecurity?

Water has become the next target for cyberattacks. No, really. Here's everything you need to know about water cybersecurity.

By 
woman-in-front-of-laptops 1
What Is Directory Bursting and How Does It Work?

Directory bursting isn't in itself harmful, but it can lead to the exposure of vulnerabilities. Here's what you need to know.

By 
photo of a flying drone 1
Can Drones Be Hacked?

Drones aren't commonly thought of as potential targets for hackers. So, are they at any particular risk?

By 
hackers-bank-account 1
5 Common Methods Hackers Use to Break Into Your Bank Account

Knowing how hackers break into bank accounts is useful. Here are ways hackers can gain access to your savings and clear you out.

By 
An elephant and a beetle juxtaposed against a screen with graphs 1
Elephant Beetle: Stealthy Hacker Group Stole Millions Undetected

A malicious group dubbed 'Elephant Beetle' uses stealthy measures to steal millions of dollars. Learn everything about them and stay protected.

By 
man in grey shirt typing on computer at desk 1
How Ethical Hacking Can Stop Hackers

Ethical hacking is a method companies can use to beat hackers at their own game. Let's explore ethical hacking and how you can get involved in it.

By 
Man Seated Outside Listening to Music 1
What Is Bluesnarfing and How Can You Prevent It?

Did you know that hackers can access data on your smartphone or computer with just Bluetooth? Here's everything you need to know about bluesnarfing.

By 
Code 1
A Beginner's Guide to Metasploit in Kali Linux (With Practical Examples)

Learn about the basic interface and modules of Metasploit and how to use them to exploit MySQL vulnerabilities in Metasploitable 2.

By 
crack hashes on linux with hashcat 1
How to Use hashcat to Crack Hashes on Linux

Cracking passwords is an important skill to learn if you're into penetration testing. Here's how you can crack hashes on Linux using hashcat.

By 
macbook pro showing programing on desk while next to books 1
What Are the 5 Steps of Ethical Hacking?

Ethical hacking is not a contradiction; some people use their evil-genius skills to help improve security, and here’s how they do it.

By 
Streaming-Website-Various-Movies 1
Beware Fake Movie Streaming Sites Like BazaLoader and BravoMovies

Cybercriminals use a diverse range of tactics to hack you, including making fraudulent streaming platforms and fake hacking.

By 
hands in black fingerless gloves typing on a laptop in a dark room 1
How Predictive Analytics Can Combat Cybercrime

We may not be quite ready to tackle pre-crime in the physical world, but when it comes to cyber criminals, AI is making waves.

By 
Hacker with a phone in the background.  1
"Is My Phone Hacked?" Here's How to Tell

Do you suspect that your phone has been hacked? Learn the telltale signs of a compromised phone.

By 
Open Padlock on Laptop Keyboard 1
Zero-Day Exploits Explained: What Are They and How Do You Counter Them?

Zero-day exploits present a dangerous threat that can cause repeated cyberattacks. Let's explore what they are and how you can protect yourself.

By 
hooded hacker in front of a giant screen 1
The 4 Biggest Hacks of 2021 (and What We Can Learn From Them)

From ransomware to cryptocurrency, here are some of the biggest hacks of 2021 and what regular users should learn from them.

By 
3 4 5 6 7
Page 5 / 12