Thứ Năm, 24 tháng 7, 2014

Data-Leakage, Regulatory Compliance & BYOD

Newsletter

Data-Leakage, Regulatory Compliance & BYOD

Learn the characteristics of a modern security solution for BYOD. Click here to download
[Sponsored]

Latest News Jul 24, 2014

50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability The users of WordPress, a free and open source blogging tool as well as content management system (CMS), that have a popular unpatched wordPress plugin installed are being cautioned to upgrade their sites immediately. A serious vulnerability in the WordPress plugin, MailPoet, could essentially allows an attacker to inject any file including malware, defacements and spam, whatever they wanted on ...

Researchers Demonstrate Zero-Day Vulnerabilities in Tails Operating System The critical zero-day security flaws, discovered in the privacy and security dedicated Linux-based Tails operating system by the researcher at Exodus Intelligence that could help attackers or law enforcements to de-anonymize anyone's identity, actually lie in the I2P software that's bundled with the Operating System. Exodus Intelligence has released some details and a video evidence that ...

HTML5 Canvas Fingerprint — Widely Used Unstoppable Web Tracking Technology Till Now we have seen many traditional way of tracking web users, such as using cookies that get saved on user's system may not be available forever to many companies, but a new method of tracking users has emerged that worked without the use of cookies. From last two years, many websites and tracking softwares are utilizing the fingerprinting power of HTML5 Canvas, which is a HTML element ...

Warning — Zero-Day Vulnerabilities Identified in Tails Operating System The critical zero-day security flaws has been discovered in the privacy and security dedicated Linux-based operating system "Tails" that could be used by an attacker to unmask your identity. Tails, which is been used and recommended by the global surveillance whistleblower Edward Snowden to remain Anonymous, has a suite of privacy applications and designed to keep users' communications ...

Apple Strongly Denies Claims of Installing iOS Backdoor The allegations from a data forensic expert and security researcher that iOS contains a "backdoor" permitting third parties to potentially gain access to large amount of users' personal data instigated Apple to give a strong response. The company has completely denied to the claims published over the weekend by Jonathan Zdziarski, a forensic scientist and iOS security expert. The ...

Data-Leakage, Regulatory Compliance & BYOD

Learn the characteristics of a modern security solution for BYOD. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét