Thứ Hai, 5 tháng 1, 2015

The Hacker News Daily Updates

Newsletter

Winning the War on Cybercrime: The Four Keys to Holistic Fraud Prevention

Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced Man-in-the-Browser (MitB) malware and spear phishing attacks. Click here to download
[Sponsored]

Latest News Jan 5, 2015

WiFiPhisher — Automated Phishing Attacks Against Wi-Fi Networks A Greek security researcher, named George Chatzisofroniou, has developed a WiFi social engineering tool that is designed to steal credentials from users of secure Wi-Fi networks. The tool, dubbed WiFiPhisher, has been released on the software development website GitHub on Sunday and is freely available for users. "It's a social engineering attack that does not use brute forcing in ...

Thunderstrike — Infecting Apple MacBooks with EFI Bootkit via Thunderbolt Ports A security researcher has discovered an easy way to infect Apple's Macintosh computers with an unusual kind of malware using its own Thunderbolt port. The hack was presented by programming expert Trammell Hudson at the annual Chaos Computer Congress (30C3) in Hamburg Germany. He demonstrated that it is possible to rewrite the firmware of an Intel Thunderbolt Mac. The hack, dubbed ...

Hacker Leaks Xbox One SDK that could let Developers make Homebrew Apps Just a week ago on Christmas, the massive Distributed Denial of Service (DDoS) attack from the notorious hacking group Lizard Squad knocked Sony's PlayStation Network and Microsoft's Xbox Live offline, but as if it wasn't the end of disaster for Microsoft. This time it isn't a case of services being taken down — instead, the software development kit (SDK) for the Xbox Live is being freely ...

Hacker Released 'iDict' Tool That Can Hack Your iCloud Account Hackers have a great start of new year 2015, giving a public threat to Apple's online iCloud service. A hacker using the handle "Pr0x13" has released a password-hacking tool to GitHub website that assures attackers to break into any iCloud account, potentially giving them free access to victims' iOS devices. The tool, dubbed iDict, actually makes use of an exploit in Apple's iCloud security ...

Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability A Google security researcher, 'James Forshaw' has discovered a privilege escalation vulnerability in Windows 8.1 that could allow a hacker to modify contents or even to take over victims' computers completely, leaving millions of users vulnerable. The researcher also provided a Proof of Concept (PoC) program for the vulnerability. Forshaw says that he has tested the PoC only on an updated ...

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS. Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét