IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

ethical hacking

Nomad happy to forgive hackers if they return 90% of $190 million that was stolen
A hacker against a red background
hacking

Nomad happy to forgive hackers if they return 90% of $190 million that was stolen

The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week
5 Aug 2022
HackerOne employee fired for using position to steal bug bounties
A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks
Security

HackerOne employee fired for using position to steal bug bounties

The threat actor was identified by their duplicate data, which they were trying to pass off as their own for financial gain
4 Jul 2022
Ethical hackers handed lifeline in controversial US cyber crime review
Graphical mockup of a piece of software being tested for vulnerabilities
ethical hacking

Ethical hackers handed lifeline in controversial US cyber crime review

The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protected
20 May 2022
How do you become an ethical hacker?
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
ethical hacking

How do you become an ethical hacker?

We examine what certifications do you need, what jobs are available and how much you can expect to be paid
29 Apr 2022
Certified ethical hacker and IT manager steals $575,000 in cryptocurrency from elderly person
Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing
hacking

Certified ethical hacker and IT manager steals $575,000 in cryptocurrency from elderly person

The practising IT manager stole the huge sum from an elderly person after being hired to fit a home security system
12 Apr 2022
What is the Computer Misuse Act?
Keyboard with red-glowing keys
Policy & legislation

What is the Computer Misuse Act?

If your computer systems are attacked, is the law effective enough to put those criminals behind bars?
4 Apr 2022
Ukrainian ethical hackers targeted by Russian malware attacks
Russian hacking on a laptop mockup with code sprawling over the screen
ethical hacking

Ukrainian ethical hackers targeted by Russian malware attacks

Cisco Talos researchers say the IT Army of Ukraine's Telegram channel is being hit with malicious links
11 Mar 2022
Anonymous hijacks Russian broadcasts with footage of Ukraine war
A person wearing a Guy Fawkes mask as a symbol of the Anonymous hacking collective
hacking

Anonymous hijacks Russian broadcasts with footage of Ukraine war

The hacking group said it managed to manipulate the broadcasts of three major Russian state-backed media organisations
7 Mar 2022
Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive
Graphic of a hacker walking through a digital corridor
hacking

Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive

So, you want to be a hacker? We share the best advice and resources for getting started
7 Mar 2022
Belarusian hacktivists target railway in bid to halt Russian military
A hacker against a red background
hacking

Belarusian hacktivists target railway in bid to halt Russian military

The incident is thought to be one of the first times ransomware has been used in hacktivism
25 Jan 2022
Poly Network offers up $500k bug bounty reward to its own hacker
Poly Network logo seen on a mobile phone and a computer screen
ethical hacking

Poly Network offers up $500k bug bounty reward to its own hacker

The reward has been offered following the successful return of $610 million in stolen tokens
13 Aug 2021
Poly Network hacker returns $342 million of stolen assets
Darkened image of a hacker wearing a hoodie using computing equipment
cryptocurrencies

Poly Network hacker returns $342 million of stolen assets

Hacker states that they are “not very interested in money”
12 Aug 2021
Does cyber security’s public image need a makeover?
A cartoon of a hacker wearing a black hoodie, with crosses on its eyes and blue flames surrounding it
ethical hacking

Does cyber security’s public image need a makeover?

A growing number of ethical hackers want the media to change the way it talks about the industry
30 Jul 2021
Google launches new bug bounty platform
Close up Google logo with the security lock icon isolated on black background
ethical hacking

Google launches new bug bounty platform

Vulnerability hunters will be able to improve their skills through the newly launched Bug Hunter University
28 Jul 2021
Microsoft awarded $13.6 million in bug bounties over the last 12 months
Microsoft sign-in page on screen
bugs

Microsoft awarded $13.6 million in bug bounties over the last 12 months

Over 340 security researchers from 58 countries reported a total of 1,261 valid vulnerabilities between 2020-2021
9 Jul 2021
IT Pro 20/20: Does cyber security's public image need a makeover?
IT Pro 20/20 Issue 18: Does cyber security's public image need a makeover?
cyber security

IT Pro 20/20: Does cyber security's public image need a makeover?

Issue 18 of IT Pro 20/20 looks at recent efforts to retire the 'hacker' stereotype, and how the threat landscape has changed over the past 20 years
30 Jun 2021
The IT Pro Podcast: Why is it so hard to convict hackers?
The IT Pro Podcast: Why is it so hard to convict hackers?
cyber security

The IT Pro Podcast: Why is it so hard to convict hackers?

Catching cyber criminals is hard enough - but putting them behind bars is even more challenging
4 Jun 2021
Apple's AirTag tracker has already been hacked
White Apple AirTag with a smiling emoji on it
hacking

Apple's AirTag tracker has already been hacked

An IT security researcher redirected the device’s finding feature to his own website
10 May 2021
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
depatment of defenve buiding
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

This move allows greater research and reporting of bugs to Pentagon
5 May 2021
Security researchers take control of a Tesla via drone
Tesla factory
ethical hacking

Security researchers take control of a Tesla via drone

Cyber security researchers found a way to unlock the car doors with a Wi-Fi dongle
5 May 2021
Widely-used cyber crime forums targeted in hacking spree
A person on a laptop to depict hacking
hacking

Widely-used cyber crime forums targeted in hacking spree

Security researchers say hacker-on-hacker campaigns indirectly help the good guys
5 Mar 2021
MoD launches bug bounty programme
Image of a cyber criminal using several computers in a dark room
Security

MoD launches bug bounty programme

Researchers are encouraged to report any flaws they find on MoD systems, but they must not engage in social engineering or phishing attacks
10 Dec 2020
Apple pays ethical hackers $288k for finding 55 vulnerabilities
The Apple logo stuck onto a glass building
Security

Apple pays ethical hackers $288k for finding 55 vulnerabilities

If exploited the bugs would have provided access to Apple's infrastructure and sensitive user data
9 Oct 2020