Next time you find yourself hooked up behind the wheel, make sure that your car is actually in your control.
Hackers are now able to break into hundreds of thousands of vehicles on the road.
Car hacking is a hot topic today and until now it was performed only while researchers were hard-wired into a car's electrical system.
However, the most recent hack performed by two computer hackers, who have
blog itc
Thứ Bảy, 25 tháng 7, 2015
All Smartwatches are vulnerable to Hackers
Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch.
Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks.
In a study, HP's Fortify tested today's top 10 smartwatches for security features, such
Thứ Sáu, 24 tháng 7, 2015
Introducing 93Gbps High-Speed Tor-Like Encrypted Anonymous Network
I think you'll agree with me when I say:
It's quite hard to maintain anonymity on the Internet using the slow Tor network. Or is it?
Well, it turns out, you may soon boost your online anonymity dramatically with the help of a new high-speed anonymity network.
A group of six academics have developed a Tor network alternative for users that allows high-speed anonymous web surfing,
Nhãn:
anonymity software,
Anonymous Browser,
high speed anonymous proxy,
Hornet Anonymous network,
network security,
Onion Routing,
Privacy,
tor browser,
Tor network
RCSAndroid — Advanced Android Hacking Tool Leaked Online
As digging deeper and deeper into the huge Hacking Team data dump, security researchers are finding more and more source code, including an advanced Android Hacking Tool.
Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest versions of the android
Oh Gosh! Four Zero Day Vulnerabilities Disclosed in Internet Explorer
How many Zero-Days do you think could hit Microsoft today? Neither one nor two; this times its Four.
The Hewlett-Packard's Zero-Day Initiative (ZDI) has disclosed four new zero-day vulnerabilities in Microsoft's Internet Explorer browser that could be exploited to remotely execute malicious code on victim's machine.
All the four zero-days originally were reported to Microsoft, affecting
Thứ Năm, 23 tháng 7, 2015
WordPress 4.2.3 Security Update Released, Patches Critical Vulnerability
WordPress has just released the new version of its content management system (CMS), WordPress version 4.2.3, to fix a critical security vulnerability that could have been exploited by hackers to take over websites, affecting the security of its Millions of sites.
WordPress version 4.2.3 resolves a Cross-Site Scripting (XSS) flaw that could allow any user with the Contributor or Author role
Bug in OpenSSH Opens Linux Machines to Password Cracking Attack
A simple but highly critical vulnerability recently disclosed in the most widely used OpenSSH software allows attackers to try thousands of password login attempts per connection in a short period.
OpenSSH is the most popular software widely used for secure remote access to Linux-based systems. Generally, the software allows 3 to 6 Password login attempts before closing a connection, but a
Đăng ký:
Bài đăng (Atom)