Thứ Sáu, 31 tháng 7, 2015

Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats

Newsletter

Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. Click here to download
[Sponsored]

Latest News Jul 31, 2015

Most Vulnerable Smart Cities to Cyber Attack on Internet of Things (IoT) Imagine… You drive to work in your Smart-Car connected to the GPS automatically, but a hacker breaks into your car's network, takes control of the steering wheel, crashes you into a tree, and BOOM! Believe it or not, such Cyber Attacks on smart devices are becoming Reality. Car Hacking was recently demonstrated by a pair of security researchers who controlled a Jeep Cherokee ...

Hackers Can Remotely Hack Self-Aiming Rifles to Change Its Target High-tech Sniper Rifles can be remotely hacked to shoot the wrong target – Something really scary and unpredictable. Yes, Hackers can remotely gain access to the $13,000 TrackingPoint sniper rifles that run Linux and Android operating system and have Wi-Fi connections. So then they can either disable the gun or choose a wrong target. A married pair of security researchers have proved that ...

New Android Vulnerability Could Crash your Phones Badly Bad week for Android. Just days after a critical Stagefright vulnerability was revealed in the widely popular mobile platform, another new vulnerability threatens to make most Android devices unresponsive and practically unusable to essential tasks. Security researchers at Trend Micro have developed an attack technique that could ultimately crash more than 55 percent of Android phones, ...

United Airlines Hacked by Sophisticated Hacking Group A group of China-backed hackers believed to be responsible for high-profile data breaches, including the U.S. Office of Personnel Management and the insurance giant Anthem, has now hit another high-profile target – United Airlines. United detected a cyber attack into its computer systems in May or early June; Bloomberg reported, citing some unnamed sources familiar with the matter. ...

This $10 Device Can Clone RFID-equipped Access Cards Easily Are you the one who simply punch your wallet against a reader to get into your office? Then surely your office is using Radio-Frequency Identification (RFID) cards to manage building access and security. However, these most common access control systems are incredibly easy to hack — and now more than ever before. Thanks to a $10 tiny device developed by two security researchers that can ...

Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét