Thứ Bảy, 4 tháng 4, 2015

The Hacker News Weekend Updates

Newsletter

Ten Risky Security Behaviors to Avoid: Protect Your Organization

Learn about common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company. Click here to download
[Sponsored]

Latest News Apr 4, 2015

OnePlus OxygenOS Now Available for Download OnePlus One users might be waiting for the new Lollipop based ROM for their smartphones. The wait is over as the popular Chinese smartphone maker OnePlus has finally released its own custom ROM -- OnePlus OxygenOS, which is based on Android 5.0 Lollipop. Last month, the OnePlus announced the official release of its in-house OxygenOS to 'One' on or before March 27, but was failed to ...

Dyre Wolf Banking Malware Stole More Than $1 Million Security researchers have uncovered an active cyber attack campaign that has successfully stolen more than $1 Million from a variety of targeted enterprise organizations using spear phishing emails, malware and social engineering tricks. The campaign, dubbed "The Dyre Wolf" by researchers from IBM's Security Intelligence division, targets businesses and organizations that use wire ...

How To Run Android Apps in Chrome Browser with Google ARC Last year at Google I/O developer event, Google launched a limited beta "App Runtime for Chrome" (ARC) project, which now expanded to run millions of Android apps within Chrome browser. Google has released a new developer tool called App Runtime for Chrome (ARC) Welder that allows Android apps to run on Chrome for Linux, Windows, and OS X systems. App Runtime for Chrome (ARC) was an ...

4th Member of 'Xbox Underground' Group Pleads Guilty to $100 Million Theft The Fourth and final member of an international hacking group called "Xbox Underground" (XU) has pled guilty to steal more than $100 Million in intellectual property and data from Microsoft, Epic Games, and Valve Corporation. In addition, the group also stole an Apache helicopter simulator developed by Zombie Studios (''Zombie") for the U.S. Army and gained access to the U.S. Army's ...

TrueCrypt Security Audit Concludes No NSA Backdoor The Security audit of TrueCrypt disk-encryption software has been completed, with no evidence of any critical design vulnerabilities or deliberate backdoors in its code. TrueCrypt -- one of the world's most-used open source file encryption software used by Millions of privacy and security enthusiasts -- is being audited from past two years by a team of security researchers to assess if it ...

Ten Risky Security Behaviors to Avoid: Protect Your Organization

Learn about common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét