Hacking

What is an advanced persistent threat (APT)?
Learn about advanced persistent threats, which are sophisticated, long-term cyberattacks targeting sensitive data.
Updated: May 21, 2025 · 10 min read
What to dial to see if your phone is hacked: 9 useful codes
Discover what to dial to see if your phone is hacked and learn the next steps to take if it is.
Published: March 27, 2025 · 7 min read
Webcam hacking: How to spot and prevent webcam spies
Learn how to protect yourself from webcam hacking attacks and keep your private life more secure.
Updated: March 21, 2025 · 11 min read
IP spoofing: What is it and how does it work?
IP spoofing is a technique cybercriminals use to manipulate internet data. Learn more about what it is and how it works.
Published: March 05, 2025 · 10 min read
What is hacking, who are hackers, and how can you protect yourself?
Hacking is the use of unauthorized methods to access devices. Read on to learn how to protect against hackers.
Updated: January 28, 2025 · 12 min read
15 types of hackers to watch out for
Learn about the different types of hackers, their motives, and tips to help stay safe online.
Updated: December 19, 2024 · 16 min read
What is a smurf attack? How it works and prevention tips
A smurf attack is a distributed DDoS attack that can render a computer inoperable — learn how to help avoid it.
Updated: December 06, 2024 · 5 min read
What is a zero-day exploit? Definition and prevention tips
Learn how hackers exploit zero-day flaws to access information so you can protect against hacking attacks.
Updated: November 29, 2024 · 6 min read
What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 · 9 min read
Credential stuffing: Examples and 3 prevention tips
Credential stuffing is a cybercrime where bad actors try to use one of your logins on multiple accounts. Learn how to protect yourself from password stuffing
Updated: September 20, 2024 · 8 min read
How hospital cyberattacks are affecting patients
Learn why healthcare facilities are prime targets for hackers and how hospital cyberattacks endanger patient care.
Published: September 11, 2024 · 4 min
GPS spoofing: What it is and why it can be dangerous
Learn about GPS spoofing and how it poses risks to your online security. Discover its legitimate and illegal uses, dangers, and ways to protect yourself.
Updated: September 06, 2024 · 6 min read
What to do if a scammer has your email address – 8 tips
What should you do if a scammer has your email address? Find out if scammers have hacked your email account and what they can do with your email address.
Updated: July 12, 2024 · 8 min read
Can iPhones get hacked? Yes, and 8 ways to fix it
Learn how iPhones can get hacked, signs to know if your iPhone’s been hacked, and how to fix the issue.
Published: June 28, 2024 · 14 min read
How to tell if your phone is tapped and what to do if it is
Unsure how to tell if your phone is tapped? Learn how to check if your phone is tapped, tracked, or monitored.
Updated: June 25, 2024 · 13 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 · 9 min read
DDoS: What is a Distributed Denial of Service attack?
Learn about DDoS attacks and help avoid them with our comprehensive cybersecurity guide, featuring DDoS types and safety tips.
Updated: May 06, 2024 · 13 min read
Watering hole attack: definition + prevention tips
Learn about watering hole attacks and how to protect yourself online. Explore prevention tips and examples of these targeted cyber threats.
Updated: February 02, 2024 · 11 min
What is a brute force attack?
Learn how to protect yourself online with our guide to brute force attacks. Understand the types, tools, and defense strategies for this prevalent cyber threat.
Updated: February 01, 2024 · 10 min read
What is a Phantom Hacker scam, and how can you avoid this apparition?
A new kind of scam that uses multiple actors to steal money is making the rounds. Educate yourself and your loved ones so you never fall for a Phantom Scam.
Published: December 14, 2023 · 6 min read
What is an attack vector? 18 types + tips to avoid becoming a victim
Learn about attack vectors and strengthen your digital defenses. Discover 18 attack vectors and get tips for how to avoid these vulnerabilities.
Published: November 14, 2023 · 17 min read
What is an attack surface? Definition + reduction tips
An attack surface refers to all of the potential security risks that leave you open to cyberattacks. Learn about your attack surface and how to reduce it.
Published: September 25, 2023 · 8 min
Hacktivism: Definition, types, + newsworthy attacks
Simply put, hacktivism is hacking and activism combined. Follow this guide to learn more about hacktivism, common motivations, and famous examples in the news.
Published: September 11, 2023 · 11 min read
Can your pet be hacked? Understanding cybersecurity risks in pet tech
Technology has simplified some pet owner responsibilities and can help us keep a closer eye on our furry friends, but could your favorite pet tech gadgets be putting you at risk of cyberthreats?
Published: August 30, 2023 · 5 min read
How to remove a hacker from my phone + tips to prevent hacking
To remove a hacker from your phone, you should review app permissions, remove unfamiliar apps, update the operating system, clear cache, or do a factory reset.
Published: July 12, 2023 · 2 min read
What is a packet sniffing attack? A cybersecurity guide
A packet sniffing attack is a hacking technique that uses a packet sniffer to intercept sensitive data passing through a network.
Published: June 30, 2023 · 3 min
What is a script kiddie? Definition + examples
A script kiddie is an amateur hacker who relies on prewritten scripts. Read along to learn more about script kiddies, how they work, and how to stay safe.
Published: June 22, 2023 · 3 min read
What is a pass the hash attack? + How to mitigate an attack
Follow this helpful guide to help learn more about pass the hash attacks, how they work, real-life examples, and how you can help to mitigate an attack.
Published: June 22, 2023 · 3 min
15 infamous hacker groups to look for [1981 to 2024]
Hacking groups can be a major threat to your business and are widely active on the web today. Learn about the top 15 hacker groups to watch for in this guide.
Published: June 21, 2023 · 5 min
What is bluejacking? Definition + protection tips
If you use Bluetooth, you may be at risk of bluejacking. Follow this guide to learn more about bluejacking, how to spot it, and how to stay safe.
Published: June 19, 2023 · 3 min
What is cryptojacking? An overview + prevention tips
Cryptojacking refers to the illegal use of stolen computing power to mine cryptocurrency. Read our article to learn how to detect and prevent this cybercrime.
Published: June 14, 2023 · 3 min
How to tell if someone hacked your router: 10 warning signs
Follow this guide to learn how to tell if someone hacked your router. We also cover how to fix a hacked router and protection tips to help keep your network safe.
Published: June 14, 2023 · 5 min read
What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 · 3 min read
What is a tailgating attack + how to protect yourself
If someone asks you to let them into a restricted area, it could be a tailgating attack. Read along to learn more about tailgating attacks and how to stay safe.
Published: June 13, 2023 · 3 min
What is an evil twin attack? How to spot and avoid them
If you use public Wi-Fi, you may be at risk of an evil twin attack. So how do these attacks work, and how can you spot and avoid them? Read along to find out.
Published: June 13, 2023 · 5 min read
Bluesnarfing: An overview + prevention tips
Bluesnarfing attacks can put your files and Bluetooth devices in jeopardy. Follow this guide to learn more about bluesnarfing and how you can help prevent an attack.
Published: November 23, 2022 · 4 min read
How hackers hack credit cards
When you hear about a data breach in which millions of credit card numbers here is what usually happens.
Published: August 31, 2022 · 4 min read
Dictionary attack: A definition + 10 dictionary attack protection tips
Use this dictionary attack guide as an overview of how dictionary attacks work, real-life examples, and protection tips to help keep your data safe.
Published: May 06, 2022 · 2 min read
What are Denial of Service (DoS) attacks? DoS attacks explained
A Denial of Service (DoS) attack can be easily engineered from nearly any location. Learn more about what it is and how it works.
Published: March 15, 2022 · 4 min read
What is the difference between black, white and gray hat hackers?
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
Published: February 24, 2022 · 4 min read
Session hijacking: What is a session hijacking and how does it work?
A session hijacking attack happens when an attacker takes over your internet session. A session hijacking attacker can then do anything you could do on the site. Here’s how to help protect against session hijacking.
Published: May 06, 2021 · 3 min read
What is phone account takeover fraud? Why it’s smart to protect your cellphone number
This fraud happens when a scammer takes control of your wireless phone account and phone number. It can cause plenty of financial pain.
Published: February 07, 2021 · 2 min read
What is a man-in-the-middle attack?
A man-in-the-middle attack is like eavesdropping. When data is sent between a computer and a server, a cybercriminal can get in between and spy. A man-in-the-middle attack requires three players: the victim, the entity with which the victim is trying to communicate, and the “man in the middle” who’s intercepting the victim’s communications.
Published: March 26, 2020 · 2 min read
Phone hijacking: When criminals take over your phone and everything in it
Hackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
Published: September 04, 2019 · 3 min read
High-profile people and companies among Twitter accounts hacked in Bitcoin scam: Here’s what to watch out for
Twitter hit with hack involving high-profile accounts of billionaires, celebrities, and politicians, in cryptocurrency scam. Learn what happened.
Published: August 08, 2018 · 2 min read
What is Formjacking and How Does it Work?
Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's form page to collect sensitive user information
Published: August 08, 2018 · 2 min read
What is bulletproof hosting?
Youve heard of malware, ransomware, botnets, and the like. What you dont hear about is the technology behind these threats. These threats all have to come from somewhere, theyre not just out there...
Published: August 08, 2018 · 4 min read
Can the elections get hacked?
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how...
Published: August 08, 2018 · 3 min read
Can smart speakers be hacked? 10 tips to help stay secure
39 million americans own smart speakers, according to a report from NPR and Edison Research. Experts believe a cybercriminal might be able to send a sound or signal to control your device. The good news: researchers are working on a fix.
Published: August 07, 2018 · 4 min read

Want more?

Follow us for all the latest news, tips, and updates.