Null Byte: News


Latest Articles

Article cover image
May 20, 2019

If you use a wireless mouse or keyboard, you could be leaving yourself open to attacks from hackers. Researchers at Bastille had discovered in January ...

Article cover image
Apr 19, 2018

Sophisticated hackers have been exploiting vulnerabilities in Chrome and Firefox to trick even the most careful internet users into logging into fake ...

Article cover image
Nov 30, 2017

Hackers can be notoriously difficult to buy gifts for, so we've curated a list of the top 20 most popular items Null Byte readers are buying during th ...

Article cover image
Nov 7, 2017

Hak5's products get a lot of attention. Popping up in popular shows like Mr. Robot, their hacking tools are bold proof of concepts with space built in ...

Article cover image
Oct 16, 2017

Some of us woke up at the KRACK of dawn to begin reading about the latest serious vulnerability that impacts the vast majority of users on Wi-Fi. If y ...

Jul 8, 2017

removed! ...

Article cover image
May 15, 2017

As the world goes into a frenzy over the latest strain of WannaCry ransomware, it might be a good time to remember to update all your devices. Yes, th ...

Article cover image
May 6, 2017

With chips in four out every five PCs made since 2010, few companies are as pervasive in modern computing as Intel. That's why an advisory released Mo ...

Article cover image
May 1, 2017

Maybe you thought sitting behind a Mac gives you special protection when it comes to getting hacked. Thanks to a a new report from Check Point, you ca ...

Article cover image
Apr 20, 2017

The Drug Enforcement Agency (DEA) has been purchasing spyware from the Milan-based Hacking Team and its US subsidiary Cicom USA since 2012. Public rec ...

Article cover image
Apr 15, 2017

The Shadow Brokers, a hacker group known for its dump of NSA hacking tools in 2016, has just leaked their remaining set of data which implies that the ...

Article cover image
Apr 15, 2017

ProtonMail has long been the favorite of journalists and security-conscious professionals, with Edward Snowden the most famous example. But these days ...

Article cover image
Apr 12, 2017

It's always nice getting paid to do something you love. That's why Nintendo is offering all Nintendo Switch owners a chance to find vulnerabilities be ...

Article cover image
Mar 13, 2017

In a world increasingly regulated by computers, bugs are like real-life cheat codes. They give you the power to break the rules and do good or bad wit ...

Article cover image
Oct 24, 2016

If you follow tech, you're probably familiar with Siri, Apple's personal voice assistant, which has been integrated heavily into iOS ever since iOS 5. ...

Article cover image
Oct 5, 2016

If the recent "state sponsored" Yahoo hack wasn't enough motivation for users to stop using their services, the latest news about Yahoo should be. Jos ...

Article cover image
Oct 4, 2016

Hello, Null Byters. I'm Barrow, and I'm excited to introduce myself as the new admin here on Null Byte. Just like previous admins have done before me, ...

Article cover image
Oct 3, 2016

Security journalist Brian Krebs recently suffered a record-breaking DDoS attack to his his website, clocking in at or near a whopping 620 Gbps of traf ...

Article cover image
Sep 11, 2016

There are two types of bad USBs out there. One lets you trick the computer into thinking it's a keyboard or other USB device, and the other goes strai ...

Article cover image
Aug 25, 2016

In previous posts here, I have pointed out that hackers are in high demand around the world and in nearly every industry. Every military and espionage ...

Article cover image
Aug 11, 2016

Samy Kamkar, security researcher and friend of WonderHowTo, just had one of his devices featured in Mr. Robot.If you've never heard of Samy, you've at ...

Article cover image
Jul 15, 2016

Dr. Michael Pound, a computer science researcher and professor at the University of Nottingham, uses hashcat and 4 GPUs in parallel to go through 1o b ...

Article cover image
Jun 9, 2016

If you want to make some money from catching bugs and are sick of pentesting Facebook, Google, and Microsoft's products, Uber may be your new favorite ...

Article cover image
May 26, 2016

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this ...

Article cover image
May 24, 2016

In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are explod ...

Article cover image
May 1, 2016

Well this law was passed...Our privacy is slowly being pulled away from us. But I'm certainly not going to let it stop me. We'll just have to take mor ...

Article cover image
Apr 19, 2016

As many of you know, Standard User proposed that we start a Capture the Flag (CTF) competition. I think this is a great idea! Standard User proposed t ...

Article cover image
Apr 12, 2016

Welcome back, my novice hackers!You have probably heard of the Panama Papers hack by now. This was a hack of the servers at Mossack Fonseca, a major l ...

Article cover image
Apr 6, 2016

As most of you know, I am a strong advocate for using Linux for hacking. In fact, I would go so far as to say that you cannot be a hacker without know ...