Thứ Ba, 6 tháng 1, 2015

Configuring and Using PKI in Your Microsoft Network

Newsletter

Configuring and Using PKI in Your Microsoft Network

Public Key Infrastructure (PKI) can become a fairly complex environment and deployment, as it involves multiple components that all need to work together smoothly. Click here to download
[Sponsored]

Latest News Jan 6, 2015

Gogo In-flight Internet issues Fake SSL Certificates to its own Customers Gogo — one of the largest providers of in-flight Internet service — has been caught issuing fake SSL certificates, allowing the inflight broadband provider to launch man-in-the-middle (MITM) attacks on its own users, view passwords and other sensitive information. The news came to light when security engineer Adrienne Porter Felt, who works on Google Chrome's security team, was served the ...

Bitstamp Bitcoin Exchange Hacked, $5 Million Stolen in Hack Attack One of the biggest, reliable and most trusted Bitcoin exchange — Bitstamp — on Monday announced that it has been a target of a hacking attack, which lead to the theft of "less than 19,000 BTC" (worth about $5 million in virtual currency; one BTC is about $270). Bitstamp issued a statement on its official website in which the company warned its users not to deposit any Bitcoin to ...

WiFiPhisher — Automated Phishing Attacks Against Wi-Fi Networks A Greek security researcher, named George Chatzisofroniou, has developed a WiFi social engineering tool that is designed to steal credentials from users of secure Wi-Fi networks. The tool, dubbed WiFiPhisher, has been released on the software development website GitHub on Sunday and is freely available for users. "It's a social engineering attack that does not use brute forcing in ...

Thunderstrike — Infecting Apple MacBooks with EFI Bootkit via Thunderbolt Ports A security researcher has discovered an easy way to infect Apple's Macintosh computers with an unusual kind of malware using its own Thunderbolt port. The hack was presented by programming expert Trammell Hudson at the annual Chaos Computer Congress (30C3) in Hamburg Germany. He demonstrated that it is possible to rewrite the firmware of an Intel Thunderbolt Mac. The hack, dubbed ...

Hacker Leaks Xbox One SDK that could let Developers make Homebrew Apps Just a week ago on Christmas, the massive Distributed Denial of Service (DDoS) attack from the notorious hacking group Lizard Squad knocked Sony's PlayStation Network and Microsoft's Xbox Live offline, but as if it wasn't the end of disaster for Microsoft. This time it isn't a case of services being taken down — instead, the software development kit (SDK) for the Xbox Live is being freely ...

Configuring and Using PKI in Your Microsoft Network

Public Key Infrastructure (PKI) can become a fairly complex environment and deployment, as it involves multiple components that all need to work together smoothly. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét