criminal

Are You A Secret Cybercriminal?

On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals for various malicious pu...
apple

Immune No More: An Apple Story

For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence a...
car

Is It Possible to Hack My Car?

Whether or not it is possible to hack a car depends almost entirely on the kind of car you drive. I, for example, drive a 1998 Honda Accord, and I’m almost completely certain comp...
value

If There’s Value, They Will Hack It

Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a compromi...
exploit_title

What is an Exploit?

If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not – the m...
hacker

How Attackers Actually Steal Data

Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes have been ...