hacking
Loading page

DEF CON Researchers Hack A Dell Monitor To Show Any Pixels They Want

Why should hackers bother with complicated cross-domain hacks or redirects when they can just change the pixels on your monitor? Because it’s really hard and complicated, but not impossible, as one team at this year’s DEF CON showed.


A Hacker's Tips For Overthrowing A Government

Chris Rock, an independent security researcher, is pissed that the Director of US National Intelligence, James Clapper, is more afraid of ISIS than hackers. He’s hoping to change that by teaching hackers how to overthrow governments.


DARPA's Cyber Grand Challenge Is A Glimpse Of Our Human-Free Future

What if humans didn’t have to respond to major hacks or breaches in the networks they operated, and computers could just do it automatically? That’s a question being asked by DARPA, the US military’s boldest research arm, which set up a multi-million dollar challenge to answer that question.


Hacking A Celebrity's Phone In The 1930s Was Actually Similar To Today

Myrna Loy was a huge movie star in the 1930s and 40s. She starred in classic films like The Thin Man (1934), Manhattan Melodrama (1934), and The Best Years of Our Lives (1946). Ed Sullivan crowned her “Queen of the Movies.” But celebrity always has a dark side.


The FBI Says Its Malware Isn't Malware Because The FBI Is Good

The FBI is facing accusations that malware it deployed while running Operation Playpen, a sting that infiltrated and maintained a dark web child pornography website for two weeks and eventually led to more than 100 arrests, was illegal. But the agency swears that using malware was good because, well, the FBI had good intentions.


How To Make Any Android Phone A Nexus

Nexus phones are essential tools for any Android fan or developer because of their lack of bloatware and regular system updates. Now, thanks to tweaks to the latest version of the operating system, it’s not that difficult to get a Nexus-style experience on any handset. Here’s how you can do it.


The Beginner's Guide To The Raspberry Pi

You’ve probably seen mention of the Raspberry Pi in your travels across the internet, but what exactly is this compact piece of circuitry? What can you do with it and why would you want to? If you’re new to the life of Pi then we’re here to explain everything you need to know and then some.


North Korea Planned A Gigantic Cyber Attack Against South Korea

North Korea has been laying the groundwork for a massive cyber attack against South Korea, government officials from South Korea told Reuters.


This Modified Nintendo Power Glove Will Make You The Lord Of Drones

Nintendo’s Power Glove is a favourite among hackers looking for new uses for the decades-old peripheral. This latest project puts humanity in dominion over our quadcopter subordinates.


Hackers Are Using Infected USB Drives To Attack Critical Infrastructure 

Government-sponsored hackers are using a clever trick to attack critical infrastructure like nuclear power plants, dams and oil refineries. According to Eric Knapp, chief cybersecurity engineer at Honeywell, one third of malware found in critical infrastructure came from USB drives plugged in by users.


Loading page