Thứ Ba, 16 tháng 9, 2014

IaaS Public Clouds and the Perceived Security Threat

Newsletter

IaaS Public Clouds and the Perceived Security Threat

While people debate the security of cloud computing, you can mitigate your risks by taking advantage of nearly limitless resources and developing a proper strategy. Click here to download
[Sponsored]

Latest News Sep 16, 2014

Twitter Vulnerability Allows Hacker to Delete Credit Cards from Any Twitter Account At the beginning of this month, just like other social networks, Twitter also started paying individuals for any flaws they uncover on its service with a fee of $140 or more offered per flaw under its new Bug Bounty program, and here comes the claimant. An Egyptian Security Researcher, Ahmed Mohamed Hassan Aboul-Ela, who have been rewarded by many reputed and popular technology giants ...

Harkonnen Operation — Malware Campaign that Went Undetected for 12 Years A huge data-stealing cyber espionage campaign that targeted Banks, Corporations and Governments in Germany, Switzerland, and Austria for 12 years, has finally come for probably the longest-lived online malware operation in history. The campaign is dubbed as 'Harkonnen Operation' and involved more than 800 registered front companies in the UK — all using the same IP address – that helped ...

Google Public DNS Server Spoofed for SNMP based DDoS Attack The Distributed Denial of Service (DDoS) attack is becoming more sophisticated and complex, and, according to security experts, the next DDoS vector to be concerned about is SNMP (Simple Network Management Protocol) amplification attacks. Yesterday afternoon, the SANS Internet Storm Center reported SNMP scans spoofed from Google's public recursive DNS server searching for vulnerable ...

16-year-old Invents Device that Can Convert Breath to Speech A High-school student Arsh Shah Dilbagi has invented a portable and affordable device that converts breath into speech, helping people suffering from different developmental disabilities like locked-in syndrome, Parkinson's, or ALS to communicate using only their breath. A 16-year-old Dilbagi who hails from Harayana's Panipat region in India has come up as the only entry from Asia in the ...

Treasure Map — Five Eyes Surveillance Program to Map the Entire Internet The National Security Agency and its British counterpart, GCHQ, gained secret access to the German telecom companies' internal networks, including Deutsche Telekom and Netcologne, in an effort to "map the entire Internet — any device, anywhere, all the time." As reported by German news publication Der Spiegel, citing the new set of leaked documents provided by former NSA contractor Edward ...

IaaS Public Clouds and the Perceived Security Threat

While people debate the security of cloud computing, you can mitigate your risks by taking advantage of nearly limitless resources and developing a proper strategy. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét