Thứ Sáu, 3 tháng 4, 2015

Ten Risky Security Behaviors to Avoid

Newsletter

Ten Risky Security Behaviors to Avoid: Protect Your Organization

Learn about common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company. Click here to download
[Sponsored]

Latest News Apr 3, 2015

4th Member of 'Xbox Underground' Group Pleads Guilty to $100 Million Theft The Fourth and final member of an international hacking group called "Xbox Underground" (XU) has pled guilty to steal more than $100 Million in intellectual property and data from Microsoft, Epic Games, and Valve Corporation. In addition, the group also stole an Apache helicopter simulator developed by Zombie Studios (''Zombie") for the U.S. Army and gained access to the U.S. Army's ...

TrueCrypt Security Audit Concludes No NSA Backdoor The Security audit of TrueCrypt disk-encryption software has been completed, with no evidence of any critical design vulnerabilities or deliberate backdoors in its code. TrueCrypt -- one of the world's most-used open source file encryption software used by Millions of privacy and security enthusiasts -- is being audited from past two years by a team of security researchers to assess if it ...

Google Removes 200 Ad-Injectors Chrome Extensions In the War against Ad injectors, Google has started removing ad-injecting extensions for its Chrome browser after it discovered as many as 200 Chrome extensions that exposed Millions of its users to malicious software and fraudulent activities. While working with a team of researchers from the University of California, Berkeley, the search engine giant found that over 5 percent of its ...

How Hackers Could Delete Any YouTube Video With Just One Click A security researcher has discovered a simple but critical vulnerability in Google-owned YouTube that could be exploited by anyone to knock down the whole business of the popular video sharing website. Kamil Hismatullin, a Russian security bod, found a simple logical vulnerability that allowed him to delete any video from YouTube in one shot. While looking for Cross-Site Scripting (XSS) or ...

FREAK Attack: How to Protect Yourself The recently disclosed FREAK (Factoring attack on RSA Export Keys) attack is an SSL/TLS vulnerability that is affecting major browsers, servers and even mobile devices.  FREAK vulnerability allows the attacker to intercept HTTPS connections between vulnerable clients and servers and force them to use weakened encryption, which the attacker can break to manipulate or steal sensitive data. ...

Ten Risky Security Behaviors to Avoid: Protect Your Organization

Learn about common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét