Thứ Năm, 5 tháng 3, 2015

10 Ways Everyone Should Approach Cybersecurity in 2015

Newsletter

10 Ways Everyone Should Approach Cybersecurity in 2015

Discover 10 key lessons we need to learn (or learn again) from cybersecurity compromises. Click here to download
[Sponsored]

Latest News Mar 5, 2015

CASPER Surveillance Malware Linked to French Government Last month, cyber security researchers spotted a new strain of french surveillance malware, dubbed "Babar," which revealed that even French Government and its spying agency the General Directorate for External Security (DGSE) is dedicatedly involved in conducting surveillance operation just like the United States — NSA and United Kingdom — GCHQ. A powerful piece of surveillance malware, ...

Angler Exploit Kit Uses Domain Shadowing technique to Evade Detection The world's infamous Angler Exploit Kit has become the most advanced, much more powerful and the best exploit kit available in the market, beating the infamous BlackHole exploit kit, with a host of exploits including zero-days and a new technique added to it. Angler Exploit Kit's newest technique is dubbed "Domain Shadowing" which is considered to be the next evolution of online crime. ...

Android Wear App for iPhone and iPad compatibility may Launch Soon As you may be aware, you need an Android smartphone to use an Android Wear smartwatch, but if you carry an Apple iPhone or iPad, you'll soon be able to use the same Android Wear smartwatch, without relying on unofficial third-party app support. Google is reportedly going to release its a new iOS app over to the App Store that will allow iPhone and iPad users to pair Android Wear devices such as ...

'FREAK' — New SSL/TLS Vulnerability Explained Another new widespread and disastrous SSL/TLS vulnerability has been uncovered that for over a decade left Millions of users of Apple and Android devices vulnerable to man-in-the-middle attacks on encrypted traffic when they visited supposedly 'secured' websites, including the official websites of the White House, FBI and National Security Agency. Dubbed the "FREAK" vulnerability ( ...

MongoDB phpMoAdmin GUI Tool Zero-day Vulnerability Puts Websites at Risk About two weeks back, over 40,000 organizations running MongoDB were found unprotected and vulnerable to hackers. Now, once again the users of MongoDB database are at risk because of a critical zero-day vulnerability making rounds in underground market. MongoDB, one of the leading NoSQL databases, is an open-source database used by companies of all sizes, across all industries for a wide ...

10 Ways Everyone Should Approach Cybersecurity in 2015

Discover 10 key lessons we need to learn (or learn again) from cybersecurity compromises. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét