Thứ Tư, 30 tháng 12, 2015

The Hacker News Daily Updates

Newsletter

6 Questions For a Prospective Cloud Service Provider

Develop a strategy for how to select the right vendor for your business. Click here to download
[Sponsored]

Latest News Dec 30, 2015

Tor Project to Start Bug Bounty Program — Get Paid for HACKING! The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – will soon be launching a "Bug Bounty Program" for researchers who find loopholes in Tor apps. The bounty program was announced during the recurring 'State of the Onion' talk by Tor Project at Chaos Communication Congress held in Hamburg, Germany. Bug ...

North Korea's Red Star OS (Looks Like Mac OS X) Spies on its Own People North Korea has its own homegrown computer operating system that looks remarkably just like Apple's OS X, which not only prevents potential foreign hacking attempts but also provides extensive surveillance capabilities. Two German researchers have just conducted an in-depth analysis of the secretive state's operating system and found that the OS does more than what is known about it. ...

Jail Authorities Mistakenly Early Released 3,200 Prisoners due to a Silly Software Bug Washington State Department of Corrections (DoC) is facing an investigation after it early released around 3,200 prisoners over the course of 13 years, since 2002, when a bug was introduced in the software used to calculate time credits for inmates' good behavior. The software glitch led to a miscalculation of sentence reductions that US prisoners were receiving for their good behaviour. ...

Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K A former employee of Russian search engine Yandex allegedly stole the source code and key algorithms for its search engine site and then attempted to sell them on the black market to fund his own startup. Russian publication Kommersant reports that Dmitry Korobov downloaded a type of software nicknamed "Arcadia" from Yandex's servers, which contained highly critical information, including ...

Microsoft Keeps Backup of Your Encryption Key on its Server — Here's How to Delete it Have you recently purchased a Windows computer? Congratulations! As your new Windows computer has inbuilt disk encryption feature that is turned on by default in order to protect your data in case your device is lost or stolen. Moreover, In case you lost your encryption keys then don't worry, Microsoft has a copy of your Recovery Key. But Wait! If Microsoft already has your Disk ...

30 Steps to a Secure Organization: A No Nonsense Approach to Objectively Evaluating Your Information Security

30 Steps to a Secure Organization is loaded with specific and useful information about securing your organization. It is an easy-to-use and comprehensive guide to evaluating your information security Click here to download
[Sponsored]

This email was sent to gdjdfjhfhfn.thanhnien@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences, please click here.

The Hacker News | Global
Contact: info@thehackernews.com
Unsubscribe

Không có nhận xét nào:

Đăng nhận xét