The Hacker News Logo
Subscribe to Newsletter

The Hacker News — Cyber Security and Hacking News Website: hacking computers

Here's the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

Here's the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

March 29, 2019Swati Khandelwal
EXCLUSIVE — While revealing details of a massive supply chain cyber attack against ASUS customers, Russian security firm Kaspersky last ...
MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

March 12, 2018Mohit Kumar
The team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a...
3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

July 27, 2017Swati Khandelwal
WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ' Imperial ,' which reveals det...
This $5 Device Can Hack your Password-Protected Computers in Just One Minute

This $5 Device Can Hack your Password-Protected Computers in Just One Minute

November 16, 2016Swati Khandelwal
You need to be more careful next time while leaving your computer unattended at your office, as it cost hackers just $5 and only 30 sec...
Oh, It's On Sale! USB Kill to Destroy any Computer within Seconds

Oh, It's On Sale! USB Kill to Destroy any Computer within Seconds

September 09, 2016Swati Khandelwal
Remember Killer USB stick ? A proof-of-concept USB prototype that was designed by a Russian researcher, Dark Purple, last year, to effe...
New Hack Uses Hard Drive's Noise to Transfer Stolen Data from Air-Gapped Computer

New Hack Uses Hard Drive's Noise to Transfer Stolen Data from Air-Gapped Computer

August 12, 2016Mohit Kumar
Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place f...
How Your Computer Monitor Could Be Hacked To Spy On You

How Your Computer Monitor Could Be Hacked To Spy On You

August 09, 2016Swati Khandelwal
Just stop believing everything you see on your screen, as it turns out that even your computer monitor can be hacked. You have seen hac...
Facebook Open Sources its Capture the Flag (CTF) Platform

Facebook Open Sources its Capture the Flag (CTF) Platform

May 11, 2016Mohit Kumar
Hacking into computer, networks and websites could easily land you in jail. But what if you could freely test and practice your hacking s...
How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

February 24, 2016Swati Khandelwal
No matter how secure you think your computer might be, something malicious can always happen. As a Computer is an open book with right tools...
Somebody Offered Money to Raspberry Pi Foundation for Pre-Installing Malware

Somebody Offered Money to Raspberry Pi Foundation for Pre-Installing Malware

December 28, 2015Mohit Kumar
The Raspberry Pi is now gaining attention from malware distributors who want the popular mini-computers to deliver with pre-install malw...
Is This Security-Focused Linux Kernel Really UnHackable?

Is This Security-Focused Linux Kernel Really UnHackable?

September 19, 2015Khyati Jain
Can you name which Operating System is most Secure ? ...Windows, Mac, Linux or any particular Linux Distribution? Yes, we get t...
200 Million WhatsApp Users Vulnerable to vCard Vulnerability

200 Million WhatsApp Users Vulnerable to vCard Vulnerability

September 09, 2015Swati Khandelwal
WhatsApp recently claimed to have hit 900 Million monthly active users , but a dangerous security flaw in the web version of the popula...
Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers

Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers

September 07, 2015Khyati Jain
Several of Seagate's 3rd generation Wireless Hard drives have a secret backdoor for hackers that puts users' data at risk. A...
Hacking Air-Gapped Computer With A Simple Cell Phone

Hacking Air-Gapped Computer With A Simple Cell Phone

July 27, 2015Mohit Kumar
Wanna Hack an extremely secure Computer? You do not need sophisticated techniques or equipment to do so. To hack an Air-Gapped computer ...
Apple Mac OS X Vulnerability Allows Attackers to Hack your Computer

Apple Mac OS X Vulnerability Allows Attackers to Hack your Computer

July 23, 2015Mohit Kumar
A security researcher has discovered a critical vulnerability in the latest version of Apple's OS X Yosemite  that could allow anyon...
How to Hack into Computers using Pita Bread and A Radio

How to Hack into Computers using Pita Bread and A Radio

June 23, 2015Swati Khandelwal
There's a new and clever way of hacking into computers, and it can be done cheaply – Using just a radio receiver and a piece of pita...
USBKill — Code That Kills Computers Before They Examine USBs for Secrets

USBKill — Code That Kills Computers Before They Examine USBs for Secrets

May 05, 2015Mohit Kumar
USBkill — A new program that once activated, will instantly disable the laptop or computer if there is any activity on USB port. Hey...
Beebone Botnet Taken Down By International Cybercrime Taskforce

Beebone Botnet Taken Down By International Cybercrime Taskforce

April 10, 2015Swati Khandelwal
U.S. and European law enforcement agencies have shut down a highly sophisticated piece of the botnet that had infected more than 12,000 ...
Exclusive Deals

Get Daily News Updates By Email

Join over 350,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.