What Are Injection Attacks and How Can You Prevent Them?
Injection attacks can allow hackers to gain access to the internals of your system. We'll show you exactly how they work and how to prevent them.
What Was the Impact of the SolarWinds Hack?
Sometimes known as the Sunburst hack, the SolarWinds data breach was a turning point for cybersecurity. Here's what happened.
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups
Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?
Will Cybersecurity Become a Popular eSport?
Interested in the US Cyber Games? Here's why cybersecurity in eSports could usher in a new era for white-hat hackers.
T-Mobile Investigates Hacker's Claims of a Huge Data Breach
100 million people's credentials are potentially at risk, but is the hacker telling the truth or is it one huge bluff?
How Your TikTok Account Can Be Hacked and How to Prevent It
TikTok's fun to get involved in, but you could compromise your security if you're not careful. Here's how to stop hackers from accessing your account.
Reactive vs. Proactive Security: Which Is More Effective?
When it comes to security, knowing how you'll tackle potential issues is critical. But what's the best way to approach this?
The 6 Types of Hackers You Should Be Aware Of
To prevent a cybersecurity attack, you need to be aware of the types of hackers and attacks they use to compromise your data.
GETTR, the Pro-Trump Social Media Platform, Got Hacked
Donald Trump has had issues with staying online in the past, and it seems those problems aren't going away.
EA Hacked, With 780GB Worth of Data Stolen
Yet another major gaming company has had its security breached.
The 5 Worst Cryptocurrency Hacks and How Much They Stole
Cryptocurrency hacks expose the security vulnerabilities of digital currency, so what are the biggest crypto hacks ever?
Security Researcher Hacks Apple’s AirTag and Modifies Its Software
A security researcher has successfully hacked his AirTag to show a custom website in Lost Mode instead of a Find My URL.
Ransomware Attack Forces Top US Gas Pipeline to Halt Operations
The investigation is still in its early stages, and it is unclear whether Colonial Pipelines plans to pay the ransom.
Hacked Verified Twitter Accounts Are Spamming Elon Musk's Tweets
The tech personality will be hosting Saturday Night Live, so perhaps that's why.
4 Ways Your Car Can Be Hacked and How to Prevent It
Even without physical access to your vehicle, hackers can take control of your car. Here's how, and how to protect yourself.
A Hacker Is Selling the User Data of 500 Million LinkedIn Users Online
To prove that the data is real, the hacker posted the personal info of two million LinkedIn users to the online forum.
Report: Hackers Are Sending Fake Job Offers on LinkedIn to Try and Steal Your Data
If you're currently job hunting on LinkedIn, stay alert! eSentire has reported hackers that want your personal info.
US Strategic Command Wasn't Hacked, That's Just Childish Gibberish
If you have kids nearby, never leave your computer unattended. Especially if you're doing social media for USSTRATCOM.
"Free Speech" Social Network Gab Was Reportedly Hacked
DDoSecrets claims that over 70GB of data was stolen from Gab, and that may include private user information.
What Is a Zero Day Exploit and How Do Attacks Work?
What is a zero day vulnerability, and is there any way you can protect your systems from a 0 day attack?