13-year-old SSL/TLS Weakness Exposing Sensitive Data in Plain Text

13-year-old SSL/TLS Weakness Exposing Sensitive Data in Plain Text, , http://feedproxy.google.com/~r/TheHackersNews/~3/RrqR2iDrGX4/rc4-ssl-tls-security.html, The most popular and widely used encryption scheme has been found to be weaker with the disclosure of a new attack that...

GitHub hit by Massive DDoS Attack From China

GitHub hit by Massive DDoS Attack From China, , http://feedproxy.google.com/~r/TheHackersNews/~3/maJXewY0-L0/github-hit-by-massive-ddos-attack-from_27.html, Github – a popular coding website used by programmers to collaborate on software development – was hit by a large-scale...

Optimize Web Pages Using “Data Saver Chrome Extension” to Save Bandwidth

Optimize Web Pages Using “Data Saver Chrome Extension” to Save Bandwidth, , http://feedproxy.google.com/~r/TheHackersNews/~3/mZn5AJaSFoU/data-saver-chrome-extension.html, Google want to save its users’ bandwidth at home. The company has released a “Data...

Vulnerability in Hotel WiFi Network Exposes You to Hackers

Vulnerability in Hotel WiFi Network Exposes You to Hackers, , http://feedproxy.google.com/~r/TheHackersNews/~3/cZ3GOYUkgEk/hacking-hotel-wifi-network.html, There is no end to users problem when it comes to security. Everything is easily hackable — from home wireless routers to...

Facebook Messenger Platform Launches at F8 Developer Conference

Facebook Messenger Platform Launches at F8 Developer Conference, , http://feedproxy.google.com/~r/TheHackersNews/~3/WLR4RVlQJxY/facebook-messenger-platform.html, Yesterday at its annual F8 Developer Conference in San Francisco, Facebook officially turned its Messenger app into a...

Dangerous ‘Vawtrak Banking Trojan’ Harvesting Passwords Worldwide

Dangerous ‘Vawtrak Banking Trojan’ Harvesting Passwords Worldwide, , http://feedproxy.google.com/~r/TheHackersNews/~3/bFmAzCMdjSQ/vawtrak-banking-trojan.html, Security researcher has discovered some new features in the most dangerous Vawtrak, aka Neverquest, malware...

Hacking Air-Gapped Computers Using Heat

Hacking Air-Gapped Computers Using Heat, , http://feedproxy.google.com/~r/TheHackersNews/~3/N3DvR6-D96k/hacking-air-gapped-computer.html, An air-gapped computer system isolated from the Internet and other computers that are connected to external networks believes to be the most...

Section 66A of IT Act is Unconstitutional, Supreme Court Rules

Section 66A of IT Act is Unconstitutional, Supreme Court Rules, , http://feedproxy.google.com/~r/TheHackersNews/~3/dj6hqD3F1tY/IT-act-section-66A.html, The Supreme Court of India today struck down Section 66A of the Information Technology Act — a controversial law that...

Cisco IP Phones Vulnerable To Remote Eavesdropping

Cisco IP Phones Vulnerable To Remote Eavesdropping, , http://feedproxy.google.com/~r/TheHackersNews/~3/MIy9zx6ghkQ/cisco-ip-phones-hacking.html, A critical vulnerability in the firmware of Cisco small business phones lets an unauthenticated attacker to remotely eavesdrop on...
%d bloggers like this: