Thứ Tư, 4 tháng 2, 2015

The Best Tweaks You Can Make To Your Android Without Rooting

Newsletter

The Best Tweaks You Can Make To Your Android Without Rooting

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. Click here to download
[Sponsored]

Latest News Feb 4, 2015

Microsoft Internet Explorer Universal Cross-Site Scripting Flaw A serious vulnerability has been discovered in all the latest versions of Microsoft's Internet Explorer that allows malicious hackers to inject malicious code into users' websites and steal cookies, session and login credentials. UNIVERSAL XSS BUG WITH SAME ORIGIN POLICY BYPASSThe vulnerability is known as a Universal Cross Site Scripting (XSS) flaw. It allows attackers to bypass the ...

Adware Android Apps Found in Google Play With Millions of Downloads With the rise in mobile market, last year we have seen sharp growth in malicious 'adware' — the most prevalent mobile threat in the world. And now, security researchers have once again found Google Play Store offering malicious apps that are infecting millions of Android users with adware. It's not at all surprising that the Android operating system is surrounded by a number of unwanted ...

Have a D-Link Wireless Router? You might have been Hacked The popular DSL wireless router model from D-Link are allegedly vulnerable to a software bug that could allow remote hackers to modify the DNS (Domain Name System) settings on affected routers and to hijack users' traffic. The main goal of DNS hijacking is to secretly redirect user's traffic from a legitimate websites to a malicious one controlled by hackers. The vulnerability might also ...

China Demands Tech Companies to give them Backdoor and Encryption Keys A number of western companies are doing big business in China, but now they may have to pay a huge value for to do so. China has introduced strict new banking cyber security regulations on western companies selling technology to Chinese banks. The Chinese government wants backdoors installed in all technologies that imports into the Middle Kingdom for the benefit of Chinese security ...

WebRTC Vulnerability leaks Real IP Addresses of VPN Users An extremely critical vulnerability has recently been discovered in WebRTC (Web Real-Time Communication), an open-source standard that enables the browsers to make voice or video calls without needing any plug-ins. AFFECTED PRODUCTS Late last month, security researchers revealed a massive security flaw that enables website owner to easily see the real IP addresses of users through WebRTC, ...

The Best Tweaks You Can Make To Your Android Without Rooting

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét