Thứ Tư, 25 tháng 3, 2015

Advanced Cybercrime/Terrorism Report

Newsletter

Advanced Cybercrime/Terrorism Report

Learn about threats to Network Connected Infrastructure and Drug Trafficking through Autonomously flying Drones. Click here to download
[Sponsored]

Latest News Mar 25, 2015

Dangerous 'Vawtrak Banking Trojan' Harvesting Passwords Worldwide Security researcher has discovered some new features in the most dangerous Vawtrak, aka Neverquest, malware that allow it to send and receive data through encrypted favicons distributed over the secured Tor network. The researcher, Jakub Kroustek from AVG anti-virus firm, has provided an in-depth analysis (PDF) on the new and complex set of features of the malware which is considered to be ...

Hacking Air-Gapped Computers Using Heat An air-gapped computer system isolated from the Internet and other computers that are connected to external networks believes to be the most secure computers on the planet -- Yeah?? You need to think again before calling them 'safe'. A group of Israeli security researchers at the Cyber Security Labs from Ben Gurion University have found a new technique to hack ultra-secure air-gapped computers ...

Section 66A of IT Act is Unconstitutional, Supreme Court Rules The Supreme Court of India today struck down Section 66A of the Information Technology Act -- a controversial law that allowed law enforcement officials to arrest people for posting "offensive" comments on social networks and other internet sites. After hearing a clutch of petitions by defenders of free speech, the Supreme Court described the 2009 amendment to India's Information ...

Cisco IP Phones Vulnerable To Remote Eavesdropping A critical vulnerability in the firmware of Cisco small business phones lets an unauthenticated attacker to remotely eavesdrop on private conversation and make phone calls from vulnerable devices without needing to authenticate, Cisco warned. LISTEN AND MAKE PHONE CALLS REMOTELY The vulnerability (CVE-2015-0670) actually resides in the default configuration of certain Cisco IP phones is ...

Simplest Way to Check If Your Emails Are Being Tracked You might be not aware of the companies that know pretty much everything related to your email activities like when you've opened email sent by one of their clients, where you are located, what device you're using, what link you click, all without your consent, even if you haven't click any link provided in that email. Companies like Yesware, Bananatag, and Streak track emails, usually by ...

Advanced Cybercrime/Terrorism Report

Learn about threats to Network Connected Infrastructure and Drug Trafficking through Autonomously flying Drones. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét