Finland's Ministry of Foreign Affairs networks hit by sophisticated Malware attack Finnish commercial broadcaster MTV3 reports that the Finnish Ministry of Foreign Affair networks has been targeted in a four-year-long cyber espionage operation. Finland's foreign minister said, "I can confirm there has been a severe and large hacking in the ministry's data network," A large scale spying attack targeted the communications between Finland and the European Union using a ... | China is planting spying microchips in Electric Iron and kettles that can scan Wi-Fi devices to serve malware We have discussed many times in our stories the network of Intelligent devices, their capabilities and the possibilities that cyber criminals could exploit them for illegal activities. Hidden chips are used by cyber criminals and state-sponsored hackers to infiltrate company networks and organizations for various purposes, to send out spam or for cyber espionage. The fact has happened in ... | 'The Hacker News' Celebrating 3rd Anniversary The World's First Dedicated Hacking and Cyber Security News platform - 'The Hacker News' is celebrating its 3rd Anniversary today. When we began our journey 5 years back as a Small Local Community of few Hackers and Researchers, we had the dream of providing the Hacking Community with World's first Hacking News Platform. We wanted to gift them their own trusted news platform. A Unique Platform ... | 'Dark Mail Alliance', Future of surveillance proof email technology Yesterday I learned about 'Dark Mail Alliance', where Lavabit, reportedly an email provider for NSA leaker Edward Snowden and Silent Circle comes together to create a surveillance-proof email technology. Ladar Levison at Lavabit and Silent Circle CEO Mike Janke, Founders of two e-mail services that recently shut down amid government efforts to nab encryption keys, as well as the larger ... | Critical vulnerability in Twitter allows attacker to upload Unrestricted Files Security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter that allows an attacker to upload files of any extension including PHP. When an application does not validate or improperly validates file types before uploading files to the system, called Unrestricted File upload vulnerability. Such flaws allow an attacker to upload and ... | This email was sent to paradic3z.autopost@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. If you would like to manage your newsletter preferences or if you no longer wish to receive this newsletter, please click here. The Hacker News, Global Contact: info@thehackernews.com |
0 komentar:
Post a Comment