Thứ Bảy, 23 tháng 8, 2014

Weekend Updates from The Hacker News

Newsletter

The Essentials of IT Security - Free Kit

Download this kit to learn everything you need to know about IT Security. Click here to download
[Sponsored]

Latest News Aug 23, 2014

Facebook Awards $50,000 Under Its New 'Internet Defense Prize' Program Along with a dream to make Internet access available to everyone across the world, Facebook founder Mark Zuckerberg is working to make the Internet a more secure place as well. Till now, a number of large technology companies have bug bounty programs to reward researchers and cyber enthusiast who contribute in the security of Internet by finding out security holes in software or web ...

Remote Attack Could Format Your Pebble Smartwatch Easily Pebble, a wristwatch that can connect to your phone - both iOS and Android - and interact with apps, has a hard-coded vulnerability that allows a remote attacker to destroy your Smartwatch completely. Pebble Smartwatch, developed and released by Pebble Technology Corporation in 2013, is considered as one of the most popular SmartWatches that had become the most funded project in the ...

Samsung To Pay $2.3 Million Fine for Deceiving the U.S. Government The United States division of Samsung has been charged with deceiving the US government into believing that several of its products met the necessary US government policies, resulting in the US government buying unauthorised Chinese-made electronics. The South Korean electronics giant has agreed to pay the Government $2.3 million in fines to settle the charges of violating trade agreements ...

Hacking Traffic Lights is Amazingly Really Easy Hacking Internet of Things (IoTs) have become an amazing practice for cyber criminals out there, but messing with Traffic lights would be something more crazy for them. The hacking scenes in hollywood movies has just been a source of entertainment for the technology industry, like we've seen traffic lights hacked in Die Hard and The Italian Job, but these movies always inspire hackers to perform ...

AlienVault Releases Intrusion Detection Systems (IDS) Best Practices Network security practitioners rely heavily on intrusion detection systems (IDS) to identify malicious activity on their networks by examining network traffic in real time. IDS are available in Network (NIDS) and Host (HIDS) forms, as well as for Wireless (WIDS). Host IDS is installed via an agent on the system you are monitoring and analyzes system behavior and configuration status. Network ...

The Essentials of IT Security - Free Kit

Download this kit to learn everything you need to know about IT Security. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét