While most hacking is illegal, sites like Hacker’s List have gotten a lot of news coverage in recent years. These sites claim that you can hire a hacker anonymously and safely pay them with either your credit card or Bitcoin. While hacker for hire sites may claim...
We’ve all seen the headlines; breaches discovered months (or years) after the initial attack. Often, the length of time that hackers have access to a stolen network means the attack is deep into the systems and the amount of data being stolen is massive. Of course,...
There are many websites online today that promise to create randomly generated passwords for you. These password generators, also known as linear congruential generators, use algorithms to create a random string of letters, numbers and special characters. While...
Recently, it’s come out that there is a flaw in Intel chips that has left millions of computers vulnerable. This flaw allows attackers to steal any data that the Intel processor has recently accessed. The attack, dubbed ZombieLoad, was discovered by Graz University of...
The Internet of Things (IoT) has reached consumers in many ways. There are “smart” thermostats, refrigerators, lights, and home security systems that leverage the connection of the internet. For businesses, the IoT has also entered their networks in several ways. In...