What Is the AnonymousFox Hack and How Does It Infect Websites?

As a website owner, getting your site hacked can be your worst nightmare. While a large number of sites are considered safe because they rely on WordPress, that doesn't mean they're not prone to attack by hackers. In fact, many are being targeted by a widespread WordPress vulnerability known as the AnonymousFox, which targets the […]

Continue Reading

How Hackers Are Exploiting Microsoft Word Documents to Hack Windows

A recently discovered bug in Microsoft's proprietary MSHTML browser engine gives hackers remote code execution in all versions of Windows. Attackers are using specially crafted Word documents to exploit this zero-day bug. Unfortunately, MSHTML is also used by several Microsoft products, including Skype, Visual Studio, and Microsoft Outlook, so the problem is pretty widespread. As […]

Continue Reading

Is It Possible to Hack the Blockchain?

Blockchain, also known as Distributed Ledger Technology (DLT), is used for preserving the history and integrity of digital assets through the use of cryptographic hashing and decentralization techniques. The decentralization of the transactions makes them transparent and hard to alter. But what exactly is the blockchain and can it actually be hacked? What is its relationship with […]

Continue Reading

Here Are All the Ways People Have Found to Hack Voting Machines

It’s becoming increasingly common to see the use of electronic systems in electoral voting. Whether online voting or the electronic voting machines you’ll find at polling stations, many elections now use electronic systems of some kind. However, electronic voting is not without its risks. One of the biggest problems is the potential for such systems […]

Continue Reading

How Android Accessibility Services Can Be Used to Hack Your Phone

The Android Accessibility Service is a key part of helping the elderly and disabled use their smartphones. However, it also opens up the door for malware developers to create sneaky malware ruins people’s day. Let’s explore the Android Accessibility Service, and how it can be used for malicious intent. What Is the Android Accessibility Service? […]

Continue Reading