MUO

Hacking

Page 7

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
cyber hacker 1
What Are Injection Attacks and How Can You Prevent Them?

Injection attacks can allow hackers to gain access to the internals of your system. We'll show you exactly how they work and how to prevent them.

By 
solarwinds logo feature background 1
What Was the Impact of the SolarWinds Hack?

Sometimes known as the Sunburst hack, the SolarWinds data breach was a turning point for cybersecurity. Here's what happened.

By 
Digital illustration of the Guy Fawkes mask. 1
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups

Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?

By 
cybersecurity gamers on laptops in headphones 1
Will Cybersecurity Become a Popular eSport?

Interested in the US Cyber Games? Here's why cybersecurity in eSports could usher in a new era for white-hat hackers.

By 
T-Mobiles logo 1
T-Mobile Investigates Hacker's Claims of a Huge Data Breach

100 million people's credentials are potentially at risk, but is the hacker telling the truth or is it one huge bluff?

By 
TikTok app on a smartphone 1
How Your TikTok Account Can Be Hacked and How to Prevent It

TikTok's fun to get involved in, but you could compromise your security if you're not careful. Here's how to stop hackers from accessing your account.

By 
Photo of an anonymous hacker using a computer 1
Reactive vs. Proactive Security: Which Is More Effective?

When it comes to security, knowing how you'll tackle potential issues is critical. But what's the best way to approach this?

By 
hacker feature image 1
The 6 Types of Hackers You Should Be Aware Of

To prevent a cybersecurity attack, you need to be aware of the types of hackers and attacks they use to compromise your data.

By 
An image of GETTR 1
GETTR, the Pro-Trump Social Media Platform, Got Hacked

Donald Trump has had issues with staying online in the past, and it seems those problems aren't going away.

By 
EA company logo on a building 1
EA Hacked, With 780GB Worth of Data Stolen

Yet another major gaming company has had its security breached.

By 
bitcoin burglar feature 1
The 5 Worst Cryptocurrency Hacks and How Much They Stole

Cryptocurrency hacks expose the security vulnerabilities of digital currency, so what are the biggest crypto hacks ever?

By 
An AirTag sat next to an iPhone using Find My against a wooden background 1
Security Researcher Hacks Apple’s AirTag and Modifies Its Software

A security researcher has successfully hacked his AirTag to show a custom website in Lost Mode instead of a Find My URL.

By 
Laptop with code on the screen 1
Ransomware Attack Forces Top US Gas Pipeline to Halt Operations

The investigation is still in its early stages, and it is unclear whether Colonial Pipelines plans to pay the ransom.

By 
Elon Musk at a press conference 1
Hacked Verified Twitter Accounts Are Spamming Elon Musk's Tweets

The tech personality will be hosting Saturday Night Live, so perhaps that's why.

By 
car-can-be-hacked 1
4 Ways Your Car Can Be Hacked and How to Prevent It

Even without physical access to your vehicle, hackers can take control of your car. Here's how, and how to protect yourself.

By 
Glass window that says  1
A Hacker Is Selling the User Data of 500 Million LinkedIn Users Online

To prove that the data is real, the hacker posted the personal info of two million LinkedIn users to the online forum.

By 
 1
Report: Hackers Are Sending Fake Job Offers on LinkedIn to Try and Steal Your Data

If you're currently job hunting on LinkedIn, stay alert! eSentire has reported hackers that want your personal info.

By 
A kid playing with a computer keyboard 1
US Strategic Command Wasn't Hacked, That's Just Childish Gibberish

If you have kids nearby, never leave your computer unattended. Especially if you're doing social media for USSTRATCOM.

By 
Gab on coded background 1
"Free Speech" Social Network Gab Was Reportedly Hacked

DDoSecrets claims that over 70GB of data was stolen from Gab, and that may include private user information.

By 
Protecting a laptop from threats 1
What Is a Zero Day Exploit and How Do Attacks Work?

What is a zero day vulnerability, and is there any way you can protect your systems from a 0 day attack?

By 
5 6 7 8 9
Page 7 / 12