Thứ Sáu, 27 tháng 3, 2015

The Database Hacker's Handbook

Newsletter

The Database Hacker's Handbook: Defending Database Servers (a $50 value) FREE for a limited time!

Learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. Click here to download
[Sponsored]

Latest News Mar 27, 2015

Optimize Web Pages Using "Data Saver Chrome Extension" to Save Bandwidth Google want to save its users' bandwidth at home. The company has released a "Data Saver extension for Chrome," bringing its data compression feature for its desktop users for the first time. While tethering to a mobile Hotspot for Internet connection for your laptop, this new Data Saver extension for Chrome helps you reduce bandwidth usage by compressing the pages you visit over the ...

Vulnerability in Hotel WiFi Network Exposes You to Hackers There is no end to users problem when it comes to security. Everything is easily hackable — from home wireless routers to the large web servers that leak users' personal data into the world in one shot. If you love to travel and move hotels to hotels, then you might be dependent on free Wi-Fi network to access the Internet. However, next time you need to be extra cautious before connecting ...

Facebook Messenger Platform Launches at F8 Developer Conference Yesterday at its annual F8 Developer Conference in San Francisco, Facebook officially turned its Messenger app into a Platform. Facebook's Messenger Platform allows third-party app developers to integrate their apps with Facebook messenger app. However, other popular messaging apps are already offering similar features, like Chinese WeChat, but Facebook release is much bigger than any other ...

Dangerous 'Vawtrak Banking Trojan' Harvesting Passwords Worldwide Security researcher has discovered some new features in the most dangerous Vawtrak, aka Neverquest, malware that allow it to send and receive data through encrypted favicons distributed over the secured Tor network. The researcher, Jakub Kroustek from AVG anti-virus firm, has provided an in-depth analysis (PDF) on the new and complex set of features of the malware which is considered to be ...

Hacking Air-Gapped Computers Using Heat An air-gapped computer system isolated from the Internet and other computers that are connected to external networks believes to be the most secure computers on the planet -- Yeah?? You need to think again before calling them 'safe'. A group of Israeli security researchers at the Cyber Security Labs from Ben Gurion University have found a new technique to hack ultra-secure air-gapped ...

The Database Hacker's Handbook: Defending Database Servers (a $50 value) FREE for a limited time!

Learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét