Thứ Ba, 24 tháng 3, 2015

Ethical Hacking - FREE Video Training Course

Newsletter

Online Penetration Testing and Ethical Hacking - FREE Video Training Course

At the conclusion of this training course, you'll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system. Click here to download
[Sponsored]

Latest News Mar 24, 2015

Section 66A of IT Act is Unconstitutional, Supreme Court Rules The Supreme Court of India today struck down Section 66A of the Information Technology Act -- a controversial law that allowed law enforcement officials to arrest people for posting "offensive" comments on social networks and other internet sites. After hearing a clutch of petitions by defenders of free speech, the Supreme Court described the 2009 amendment to India's Information ...

Cisco IP Phones Vulnerable To Remote Eavesdropping A critical vulnerability in the firmware of Cisco small business phones lets an unauthenticated attacker to remotely eavesdrop on private conversation and make phone calls from vulnerable devices without needing to authenticate, Cisco warned. LISTEN AND MAKE PHONE CALLS REMOTELY The vulnerability (CVE-2015-0670) actually resides in the default configuration of certain Cisco IP phones is ...

Simplest Way to Check If Your Emails Are Being Tracked You might be not aware of the companies that know pretty much everything related to your email activities like when you've opened email sent by one of their clients, where you are located, what device you're using, what link you click, all without your consent, even if you haven't click any link provided in that email. Companies like Yesware, Bananatag, and Streak track emails, usually by ...

New "PoSeidon" Point of Sale Malware Spotted in the Wild A new and terribly awful breed of Point-of-Sale (POS) malware has been spotted in the wild by the security researchers at Cisco's Talos Security Intelligence & Research Group that the team says is more sophisticated and nasty than previously seen Point of Sale malware. The Point-of-Sale malware, dubbed "PoSeidon", is designed in a way that it has the capabilities of both the infamous Zeus ...

Chrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own Competition The Annual Pwn2Own Hacking Competition 2015 held in Vancouver is over and participants from all over the world nabbed $557,500 in bug bounties for 21 critical bugs in top four web browsers as well as Windows OS, Adobe Reader and Adobe Flash. During the second and final day of this year's hacking contest, the latest version of all the four major browsers including Microsoft Internet ...

Online Penetration Testing and Ethical Hacking - FREE Video Training Course

At the conclusion of this training course, you'll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét