MUO

Hacking

Page 6

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
black iPhone with a folder of social media apps 1
How Often Are Social Media Accounts Hacked?

How frequently do social media profiles like Facebook, Twitter, and Instagram get hacked? And how can you stop yourself being a target?

By 
Masked man in all black sitting at computer in a dark, blue screen-lit room 1
How Hackers Are Using Our Own Technology Against Us

Technology has changed many lives, but hackers are looking to use it against you and ruin yours.

By 
hacker with a face mask.  1
What Is Hacktivism and Is It the Same as Hacking?

Activist hackers sound quite scary, but maybe you've just misunderstood them. Learn who these techno crusaders are and what motivates them to act.

By 
Illustration of a hacker 1
What Is DNS Hijacking and How Can You Prevent It?

DNS hijacking poses a huge threat to internet users. But how can you stop if from happening?

By 
Massive Apple logo on a building 1
How Apple Will Alert You When You’ve Been Hacked by State-Sponsored Attackers

State-sponsored attacks sound scary, but it's better to know about them than not. Apple is taking steps to arm users with vital knowledge.

By 
Hacker at a desk laptop 1
6 Types of "Hat" Hackers and How They Operate

Do you know the difference between black, white, gray, red, blue, and green hat hackers? Here's what each type of hacker does.

By 
usb charger port 1
Are Public Smartphone Charging Stations Safe to Use?

Should you plug your device into a public charging station? Here's everything you need to know about juice jacking.

By 
security sign with a lock  1
What Is DDoS-for-Hire and Why Is It a Problem?

Has your website been a victim of a Distributed Denial of Service attack? It could be a result of DDoS-for-Hire.

By 
Wrench and lock are seen on a laptop screen, drawing 1
PayloadBin Ransomware: Everything You Need to Know

More and more cybercriminals are favoring ransomware as a form of attack. Here's what you need to know about the latest variant.

By 
Security logo 1
What Is Cobalt Strike and How Can Security Researchers Use It?

Cobalt Strike is an adversary simulation tool used by security teams during vulnerability assessments. Let us explore this useful tool in detail.

By 
playstation 5 jailbreak feature 1
Is It Legal to Jailbreak Your PS4 or PS5?

Tinkering with the hardware you own is completely legal, right?

By 
playstation 5 jailbreak feature 1
PS5 Jailbreak Moves a Step Closer After PlayStation Hackers Reveal New Exploits

Two new PS5 exploits have opened the path to PlayStation 5 jailbreaking. Could a cracked PS5 be closer than we think?

By 
hacker phishing security 1
5 Ways Your Amazon Account Can Be Hacked

If a cybercriminal gets into your Amazon account, they could cost you a fortune! So how can hackers get into your account, and how can you stop them?

By 
person-holding-smartphone 1
6 Ways Your Cell Phone Can Be Hacked—Are You Safe?

Worried about cybercriminals who know how to hack a phone? Knowledge is your first line of defense so here's how hackers target your smartphone.

By 
A poke ball is seen next to a smartphone  1
The ShinyHunters Hacker Group Collects Data Like Gamers Collect Pokémon

These cybercriminals have hit major companies. You might've even seen their logo: it's the Pokémon, Umbreon. Here's what you need to know.

By 
smart assistant speaker 1
Can Smart Assistants Be Hacked?

Smart assistants are handy to have around the house, but are they safe from hacking?

By 
Credit card reader.  1
ATM
7 Ways a Criminal Can Use a Credit Card Skimmer Against You

Even with security chips and advanced biometric features in place, credit card data can be stolen through stealthy credit card skimmers.

By 
The Twitch Logo 1
Twitch Has Been Hacked: Change Your Password and Turn on 2FA Now

The streaming platform has been thoroughly pwned, with everything leaked online, including its source code.

By 
 1
What Is Hacking and How Did It Start?

You've heard of computer hackers, but what do they actually do? How can you define "hacking"? Here's what you need to know.

By 
white-hat-security 1
What Is a White Hat Hacker?

A white hat hacker is an ethical hacker who uses their skills to protect against cyberattacks. Here's what you need to know.

By 
4 5 6 7 8
Page 6 / 12