The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook

Download this kit to learn everything you need to know about Information Security. Click here to download
[Sponsored]

Latest News Jan 12, 2014

Microsoft Official Blog and Twitter account hacked by Syrian Electronic Army It could be the worst day ever for Microsoft's patch management and Incident response team. A group of pro-Syrian  hackers 'Syrian Electronic Army' has successfully compromised the official Twitter account of the Microsoft News (@MSFTNews), Xbox Support. They also defaced the Microsoft's TechNet blog (blogs.technet.com), and posted deface not over the blog. Microsoft says the situation is under ...

Read more... Twitter Facebook Linkedin

MIT University website defaced by Anonymous hackers in honor of Aaron Swartz Today is January 11, 2014 and the last year on the same day a 26-year-old, young hacker, Reddit cofounder and the digital Activist, Aaron H. Swartz committed suicide. He found dead in his Brooklyn, New York apartment, where he had hanged himself.Swartz was indicted by a federal grand jury in July 2011, accused of hacking the MIT JSTOR database and stealing over four million ...

Read more... Twitter Facebook Linkedin

Mac OS X Flashback Trojan is still alive, recently infected 22,000 Apple machines The Flashback Trojan, the most sophisticated piece of malware that infected over 600,000 Apple's Macs systems back in April, 2012 is still alive and has infected about 22,000 machines recently, according to the researchers from Intego. For a refresh, Flashback Trojan was first discovered in September 2011, basically a trojan horse that uses a social engineering to trick users into installing a ...

Read more... Twitter Facebook Linkedin

KALI Linux 1.0.6 released; officially added Emergency Self Destruct feature A few days back the developers of one of the most advance open source operating system for penetration testing called 'KALI Linux' announced that they were planning to include "emergency self-destruction of LUKS".They patched a utility called cryptsetup, which introduces a self destruction feature that will allow the Kali user to encrypt the full hard disk to make the data ...

Read more... Twitter Facebook Linkedin

Hackers behind TARGET data breach looking for Pro-cracker to decrypt Credit card PINs I think you haven't forgotten the massive data breach occurred at TARGET, the third-largest U.S. Retailer during last Christmas Holidays. People shop during Black Friday sales in which over 40 million Credit & Debit cards were stolen, used to pay for purchases at its 1500 stores nationwide in the U.S. TARGET officially confirmed that the encrypted PINs (personal identification numbers) of payment ...

Read more... Twitter Facebook Linkedin

4 Email Security Policy Tips That Can Stop Sensitive Information Leakage

Is your email security policy sitting in a dusty three-ring binder, unread and forgotten on a shelf? Do you struggle to keep pace with changes in the regulatory environment, the devices your employees use to read email? Are your employees inadvertently leaking sensitive information because you don't have the right email safeguards in place? Click here to download
[Sponsored]

This email was sent to paradic3z.auto@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences or if you no longer wish to receive this newsletter, please click here.

The Hacker News, Global
Contact: info@thehackernews.com

0 komentar:

Post a Comment

 
Top