Empowering Information Security with Desktop Virtualization

This paper describes how desktop virtualization offers IT a powerful solution for today's information security needs. Click here to download
[Sponsored]

Latest News Oct 18, 2013

Unbreakable Apple's iMessage encryption is vulnerable to eavesdropping attack Though Apple claims iMessage has end-to-end encryption, But researchers claimed at a security conference that Apple's iMessage system is not protected and the company can easily access it. Cyril Cattiaux - better known as pod2g, who has developed iOS jailbreak software, said that the company's claim about iMessage protection by unbreakable encryption is just a lie, because the weakness is ...

Read more... Twitter Facebook Linkedin

World's 3rd Largest Chinese Bitcoin exchange hit by 100Gbps DDoS attack In March of this year, we saw the first ever 300 Gigabit DDoS attack, which was possible due to a DNS Reflection Amplification attack against Spamhaus. On 24 September World's 3rd Largest Bitcoin exchange BTC China, a platform where both Bitcoin and Chinese yuan are traded faced massive DDoS attack for continued nine hours, where no amplification techniques were used.Incapsula, ...

Read more... Twitter Facebook Linkedin

ASLR bypass techniques are popular with APT attacks Address space layout randomization (ASLR) is a security technique involved in protection from buffer overflow attacks. Many recent APT (Advanced Persistent Threat) attacks have utilized many different ASLR bypass techniques during the past year, according to Researchers at FireEye. Many exploits and malware attacks rely on the ability of the programmer to accurately identify where specific ...

Read more... Twitter Facebook Linkedin

New Zealand Government Forcing Internet Companies and Network Operators to provide Interception capability In August the New Zealand has passed a bill that radically expands the powers of  The Government Communications Security Bureau (GCSB), an intelligence agency of the New Zealand government, equivalent of the National Security Agency (NSA). The bill demands the companies and other network operators like Facebook, Microsoft, Google and Yahoo must allow New Zealand spy ...

Read more... Twitter Facebook Linkedin

Unauthorized Access Backdoor found in D-Link router Firmware Code A number of D-Link routers reportedly have an issue that makes them susceptible to unauthorized backdoor access. The researcher Craig, specialized on the embedded device hacking - demonstrated the presence of a backdoor within some DLink routers that allows an attacker to access the administration web interface of network devices without any authentication and view/change its settings. ...

Read more... Twitter Facebook Linkedin

Empowering Information Security with Desktop Virtualization

This paper describes how desktop virtualization offers IT a powerful solution for today's information security needs. Click here to download
[Sponsored]

This email was sent to paradic3z.autopost@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences or if you no longer wish to receive this newsletter, please click here.

The Hacker News, Global
Contact: info@thehackernews.com

0 komentar:

Post a Comment

 
Top