MUO

Hacking

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

An illuminated fingerprint 1
Windows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?

Researchers managed to break through Windows Hello's fingerprint scans, but it's not as scary as you first think.

By 
PC motherboard 1
What Is a Cold Boot Attack and Can You Defend Against It?

When you flick the switch on your computer off, it takes the data stored in your RAM with it, right? Don't be so sure.

By 
digital graphic of smartphone with lastpass logo in front 1
How Many Times Has LastPass Been Hacked, and Is It Still Safe to Use?

LastPass is a well-known and trusted name in password security, but its history of breaches might make you consider an alternative.

By 
hardware crypto wallet next to seed phrase card and crypto coins 1
The 10 Biggest Crypto Hacks and Scams of 2023

2023 has been a tough year for crypto security, but which platforms suffered the most?

By 
QR code on iPhone screen 1
What Is Quishing? How Can You Prevent a Quishing Attack?

Quishing turns QR codes into dangerous attack vectors. Here's how to stay safe.

By 
Person holding a phone showing the Instagram app login screen. 1
What Are OTP Bots?

OTP bots target one-time password systems to hack your accounts. Here's how to defend against them.

By 
Fake USB hacking cable 1
How to Protect Your Devices From a Fake USB O.MG Cable

A seemingly harmless USB cable can result in your devices being hacked.

By 
Image of a padlock on a computer 1
What Is Key Stretching? Here's How Your Passwords Can Be Kept Secure

Key stretching can help you keep your online accounts safe. Here's how.

By 
anonymous mask on back of man's head wearing hoodie 1
Why Does "Anonymous" Launch DDoS Cyber Attacks?

The "Anonymous" hacker group is known for its DDoS attacks, but why is this the case?

By 
person on laptop with 3D alert page in front of screen 1
Can You Trust File Malware Scanners?

No one wants malicious code in their files. But can file malware scanners really be trusted to help with this issue?

By 
infographic of a hand coming out of an email envelop in the laptop to snatch credit card and money 1
What Is the “I Sent You an Email From Your Account” Blackmail Scam? How to Avoid It

Has someone claimed to be emailing you from your own account? It may be a scam.

By 
Smartphone illustrations on black background  1
Is Someone Mirroring Your Smartphone? Here's How to Check

Smartphone mirroring puts you and your sensitive data at risk, so it's important to be aware of the warning signs.

By 
A smartphone with a wifi icon and hacker  1
What Is a Wi-Fi Karma Attack?

Wi-Fi karma attacks put you and your data at risk. Here's why...

By 
digital graphic of padlock surrounded by electrical grid 1
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?

Cryptographic oracles can be great tools for hackers. Here's why.

By 
Stylized Computer Error Message 1
What Are Improper Error Handling Vulnerabilities?

Your app may be exposed to improper error handling vulnerabilities. Here's how.

By 
Eye looking through a scope 1
What Is ZoomEye and How Is It Useful for Your Cybersecurity?

ZoomEye can prove useful for cybersecurity experts and enthusiasts, but also has its dangers.

By 
digital graphic of wifi symbol encircled by satellite on grid background 1
What Is Wi-Fi Eavesdropping? Understanding the Risks and How to Stay Secure

Cybercriminals can listen in on your Wi-Fi activity by eavesdropping. Here's how it works and how you can avoid it.

By 
cogs interacting against a purple screen 1
What Is Data Exfiltration? How Can You Stop It Happening to You?

It doesn't matter if your system carries lots of data or a small amount of it: you need to protect it from many threats, including hacks and phishing.

By 
 1
The 9 Most Common Tricks Used to Hack Passwords

Want to figure out someone's password? Review your life choices. Learn how to protect your password from hackers instead.

By 
a criminal stealing bitcoin from password manager vault 1
If You Didn’t Change Your Passwords After the LastPass Data Breach, Do It Now

Hackers have been stealing millions of dollars in cryptocurrency, seemingly after the LastPass breach. Here's what you need to know.

By 
See more articles +