Chủ Nhật, 2 tháng 8, 2015

Weekend Updates from The Hacker News

Newsletter

SANS Critical Security Controls: From Adoption to Implementation

Learn why network security professionals are using Critical Security Controls to provide a more secure network. Click here to download
[Sponsored]

Latest News Aug 2, 2015

How Spies Could Unmask Tor Users without Cracking Encryption The Onion Router (Tor) is weeping Badly! Yes, Tor browser is in danger of being caught once again by the people commonly known as "Spies," who's one and only intention is to intrude into others' network and gather information. A team of security researchers from Massachusetts Institute of Technology (MIT) have developed digital attacks that can be used to unmask Tor hidden services in ...

How to Hack Millions of Android Phones Using Stagefright Bug, Without Sending MMS Earlier this week, security researchers at Zimperium revealed a high-severity vulnerability in Android platforms that allowed a single multimedia text message to hack 950 Million Android smartphones and tablets. As explained in our previous article, the critical flaw resides in a core Android component called "Stagefright," a native Android media playback library used by Android to process ...

AntiVirus Firm BitDefender Hacked; Turns Out Stored Passwords Are UnEncrypted Forget about Financial services and Online shopping websites, but at least we expect from Security Firms and Antivirus vendors to keep our personal and Sensitive data Encrypted and Secured. One of the most popular and much-respected Antivirus and computer security firms 'BitDefender' has recently been hacked and has had a portion of its customer data leaked. The Data Breach in ...

Windows 10 Wi-Fi Sense Explained: Actual Security Threat You Need to Know Just one day after Microsoft released its new operating system, over 14 Million Windows users upgraded their PCs to Windows 10. Of course, if you are one of the Millions, you should aware of Windows 10's Wi-Fi Sense feature that lets your friends automatically connects to your wireless network without providing the Wi-Fi password. Smells like a horrible Security Risk! It even triggered ...

Most Vulnerable Smart Cities to Cyber Attack on Internet of Things (IoT) Imagine… You drive to work in your Smart-Car connected to the GPS automatically, but a hacker breaks into your car's network, takes control of the steering wheel, crashes you into a tree, and BOOM! Believe it or not, such Cyber Attacks on smart devices are becoming Reality. Car Hacking was recently demonstrated by a pair of security researchers who controlled a Jeep Cherokee ...

The Client Mandate on Security

Like most other organizations, law firms face new challenges every day when protecting their confidential information. Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét