Featured Articles
![Close-up of a Logitech USB device plugged into a laptop.](https://assets.content.technologyadvice.com/635920956111370211_47b7ea9eee.webp)
If you use a wireless mouse or keyboard, you could be leaving yourself open to attacks from hackers. Researchers at Bastille had discovered in January 2016 that attackers could make use of a cheap $15 ...
Latest Articles
![Close-up of a Logitech USB device plugged into a laptop.](https://assets.content.technologyadvice.com/635920956111370211_47b7ea9eee.webp)
If you use a wireless mouse or keyboard, you could be leaving yourself open to attacks from hackers. Researchers at Bastille had discovered in January 2016 that attackers could make use of a cheap $15 ...
![Login form with fields for username and password.](https://assets.content.technologyadvice.com/636281370944830064_ec65dbf3ba.webp)
Sophisticated hackers have been exploiting vulnerabilities in Chrome and Firefox to trick even the most careful internet users into logging into fake domains for sites like Apple, Google, and Amazon. ...
![A cluttered desk with multiple electronic devices and tangled cables.](https://assets.content.technologyadvice.com/636475817501410962_bda7631040.webp)
Hackers can be notoriously difficult to buy gifts for, so we've curated a list of the top 20 most popular items Null Byte readers are buying during their ethical-hacking studies. Whether you're buying ...
![USB to Ethernet adapter on a wooden surface.](https://assets.content.technologyadvice.com/636456215689294172_881e47766f.webp)
Hak5's products get a lot of attention. Popping up in popular shows like Mr. Robot, their hacking tools are bold proof of concepts with space built into the design for the community to add their own t ...
![Rogue channel detected with key establishment attack logs.](https://assets.content.technologyadvice.com/636437531247847301_3669968da8.webp)
Some of us woke up at the KRACK of dawn to begin reading about the latest serious vulnerability that impacts the vast majority of users on Wi-Fi. If you weren't one of those early readers, I'm talking ...
![Shadow of a person wearing a hat on a concrete surface.](https://assets.content.technologyadvice.com/636304516704666249_131bc73979.webp)
As the world goes into a frenzy over the latest strain of WannaCry ransomware, it might be a good time to remember to update all your devices. Yes, those little reminders your phone and computer throw ...
![Person installing a CPU onto a motherboard.](https://assets.content.technologyadvice.com/636295897015960530_defccb1374.webp)
With chips in four out every five PCs made since 2010, few companies are as pervasive in modern computing as Intel. That's why an advisory released Monday, May 1, confirming a remotely exploitable vul ...
![Close-up of a MacBook Pro keyboard and trackpad.](https://assets.content.technologyadvice.com/636290000143184029_783bd43970.webp)
Maybe you thought sitting behind a Mac gives you special protection when it comes to getting hacked. Thanks to a a new report from Check Point, you can kiss that theory goodbye. The cyber security com ...
!["The DEA Spent $575,000 of Your Tax Dollars on Zero-Day Exploits" cover image](https://assets.content.technologyadvice.com/636281914751660433_3d14dbb7cd.webp)
The Drug Enforcement Agency (DEA) has been purchasing spyware from the Milan-based Hacking Team and its US subsidiary Cicom USA since 2012. Public records reveal invoices between Cicom USA and the DEA ...
![Network switches and cables in a server rack.](https://assets.content.technologyadvice.com/636278077801480584_4f7a257471.webp)
The Shadow Brokers, a hacker group known for its dump of NSA hacking tools in 2016, has just leaked their remaining set of data which implies that the NSA compromised SWIFT, the global provider of sec ...
![ProtonMail logo with server equipment in the background.](https://assets.content.technologyadvice.com/636216463033098064_a1ec9426fb.webp)
ProtonMail has long been the favorite of journalists and security-conscious professionals, with Edward Snowden the most famous example. But these days, everyone cares about anonymity, so it's no surpr ...
![Person playing a video game on a handheld console.](https://assets.content.technologyadvice.com/636275999787934978_79044482d9.webp)
It's always nice getting paid to do something you love. That's why Nintendo is offering all Nintendo Switch owners a chance to find vulnerabilities before another hacker beats them to it first. Depend ...
![Nuclear explosion graphic over a keyboard.](https://assets.content.technologyadvice.com/636250107194244275_2f31963051.webp)
In a world increasingly regulated by computers, bugs are like real-life cheat codes. They give you the power to break the rules and do good or bad without ever leaving your seat. And government agenci ...
![Voice assistant interface with the prompt "What can I help you with?"](https://assets.content.technologyadvice.com/636118904743516352_b1dd4eb74e.webp)
If you follow tech, you're probably familiar with Siri, Apple's personal voice assistant, which has been integrated heavily into iOS ever since iOS 5. But you might not have known that Siri is capable ...
![Image of a graphic displaying papers being compressed by a clamp on a red background.](https://assets.content.technologyadvice.com/636111971399890267_61b9370a50.webp)
If the recent "state sponsored" Yahoo hack wasn't enough motivation for users to stop using their services, the latest news about Yahoo should be. Joseph Menn, a reporter at Reuters, just revealed tha ...
![Server room with rows of network storage units.](https://assets.content.technologyadvice.com/636105683127659301_697ae733a3.webp)
Hello, Null Byters. I'm Barrow, and I'm excited to introduce myself as the new admin here on Null Byte. Just like previous admins have done before me, I will be writing new guides, updating older guid ...
![DDoS attack on a server with multiple client devices targeted.](https://assets.content.technologyadvice.com/636111083553014870_2a0d865d5b.webp)
Security journalist Brian Krebs recently suffered a record-breaking DDoS attack to his his website, clocking in at or near a whopping 620 Gbps of traffic. Krebs' site was down for over 24 hours, and i ...
![USB connector being modified with exposed wires.](https://assets.content.technologyadvice.com/636090251208190230_b98ce0a909.webp)
There are two types of bad USBs out there. One lets you trick the computer into thinking it's a keyboard or other USB device, and the other goes straight over malicious into computer killing territory ...
![Person wearing a white cap with the word "hacker" on it, set against a digital code background.](https://assets.content.technologyadvice.com/635508895119441199_f58b05ed33.webp)
In previous posts here, I have pointed out that hackers are in high demand around the world and in nearly every industry. Every military and espionage unit of every country is trying to hire high-qual ...
![Charging device with a green indicator light.](https://assets.content.technologyadvice.com/636065015285250414_9e7975f844.webp)
Samy Kamkar, security researcher and friend of WonderHowTo, just had one of his devices featured in Mr. Robot. If you've never heard of Samy, you've at least probably heard of one of his hacks. For in ...
!["'Beast' Cracks Billions of Passwords in Seconds" cover image](https://assets.content.technologyadvice.com/636041795039420008_caad881cfa.webp)
Dr. Michael Pound, a computer science researcher and professor at the University of Nottingham, uses hashcat and 4 GPUs in parallel to go through 1o billion hashes a second in this Computerphile video ...
![Uber logo on a green background.](https://assets.content.technologyadvice.com/635942373664318522_38e7de6403.webp)
If you want to make some money from catching bugs and are sick of pentesting Facebook, Google, and Microsoft's products, Uber may be your new favorite playground. During Uber's beta bug bounty program ...
![White hat symbol representing ethical practices in SEO.](https://assets.content.technologyadvice.com/635803288623385347_f78eb33077.webp)
Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be cov ...
![Employees collaborating in a tech workspace, analyzing data on multiple monitors.](https://assets.content.technologyadvice.com/635815574877871292_be964398d0.webp)
In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are exploding! They cite that 209,000 cyber security jobs we ...
!["If you use Tor Browser, the FBI just labelled you a criminal. " cover image](https://assets.content.technologyadvice.com/635977769870039749_f0d6ca6751.webp)
Well this law was passed... Our privacy is slowly being pulled away from us. But I'm certainly not going to let it stop me. We'll just have to take more secure measures. ...
![Keep calm and capture the flag poster.](https://assets.content.technologyadvice.com/635954731460938280_41933a24be.webp)
As many of you know, Standard User proposed that we start a Capture the Flag (CTF) competition. I think this is a great idea! Standard User proposed to set up the server and the flags for this first c ...
![Protesters in pig masks holding a sign that reads "He's got to go" near Big Ben.](https://assets.content.technologyadvice.com/635960689982916419_10e90b52e4.webp)
Welcome back, my novice hackers! You have probably heard of the Panama Papers hack by now. This was a hack of the servers at Mossack Fonseca, a major law firm in Panama. This law firm specializes in a ...
![Terminal command line interface displaying directory navigation commands.](https://assets.content.technologyadvice.com/635953756204955564_18c0fb917d.webp)
As most of you know, I am a strong advocate for using Linux for hacking. In fact, I would go so far as to say that you cannot be a hacker without knowing Linux well. I laid out various reasons for thi ...