Hackers want your data. Meet the ones who are trying to protect it.

TwitterFacebook

The last two years have seen the Equifax breach, the WannaCry cyberattack, a nefarious DDoS attack that destroyed the internet for a full day, and a laundry list of other security breaches of the stores, restaurants, and retailers we know and love. A skilled hacker has a dangerous amount of power in their hands — power with the potential to destroy lives. 

But take heart: Scattered across the internet are hundreds of thousands of equally skilled hackers who are fighting to protect you. 

If your personal information wasn’t compromised this year, you have that army of nerds to thank. 

More about Hackers, Hacking, Hacking Tools, Hacking Attack, and Hacking Hackers

View More Hackers want your data. Meet the ones who are trying to protect it.

Hundreds of HP computer models carry a deactivated keylogger

TwitterFacebook

In November, a computer programmer spotted some strange code while trying to control a backlit keyboard on a Hewlett-Packard laptop.

It was a keylogger — which if turned on by a hacker is capable of monitoring every keystroke you type and save this activity to a file. It’s a common hacking technique used to steal passwords, as Google recently noted in its year-long study on computer security. 

In this case, the code was not turned on, but TechCrunch nonetheless reported on programmer Michael Myng’s blog post about finding the deactivated keylogger. In his memo, Myng wrote that he notified HP of the presence of the keylogger’s presence. Read more…

More about Tech, Cybersecurity, Hp, Hewlett Packard, and Hacking Tools

View More Hundreds of HP computer models carry a deactivated keylogger