Thứ Năm, 3 tháng 9, 2015

Online Penetration Testing and Ethical Hacking - FREE Video Training Course

Newsletter

Online Penetration Testing and Ethical Hacking - FREE Video Training Course

At the conclusion of this training course, you'll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system. Click here to download
[Sponsored]

Latest News Sep 3, 2015

Popular Belkin Wi-Fi Routers vulnerable to Hackers US-CERT has outlined about Wireless routers developed by Belkin supposedly containing several vulnerabilities. CERT in their Vulnerability Note VU#201168 (Vulnerability ID) said, that Belkin's N600 DB Wireless Dual-Band N+ Router, model F9K1102 v2 with firmware version 2.10.17 and very likely earlier versions are packed with multiple and critical vulnerabilities. The targeted router is ...

26 Android Phone Models Shipped with Pre-Installed Spyware Bought a brand new Android Smartphone? Don't expect it to be a clean slate. A new report claims that some rogue retailers are selling brand-new Android smartphones loaded with pre-installed software. Security firm G Data has uncovered more than two dozens of Android smartphones from popular smartphone manufacturers — including Xiaomi, Huawei and Lenovo — that have pre-installed spyware ...

Using Android 'AppLock' to Protect Your Privacy? — It's Useless Widely popular Android AppLock application by DoMobile Ltd. is claimed to be vulnerable to Hackers. AppLock Android app enables users to apply a security layer to their devices, which locks and hides the SMS, Gallery, Gmail, Facebook, Calls and any app installed on the device. Few of its features are: Protecting apps either in a PIN number form or a pattern lock ...

Critical OS X Flaw Grants Mac Keychain Access to Malware Back in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code that even fits in a tweet. The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the issue last month. The privilege-escalation bug was once used to circumvent security ...

FBI's Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack In both April and June this year, a series of cyber attacks was conducted against the United States Office of Personnel Management (OPM). These attacks resulted in 21 million current and former Federal government employees' information being stolen. After months of investigation, the FBI's Cyber Task Force identified several Remote Access Tools (RATs) that were used to carry out the ...

Online Penetration Testing and Ethical Hacking - FREE Video Training Course

At the conclusion of this training course, you'll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét