Tag Hackers - results: 35

Hack 2 seconds: digital protection Tesla could not resist the hackers

Hack 2 seconds: digital protection Tesla could not resist the hackers

a Group of enthusiasts from the Catholic University of Louvain (Belgium) found a way to crack digital key Tesla Model S remotely. The hacking takes no more than two seconds. About how to do it, researchers told a conference of Cry...

155

1 0

2018-09-12

Comments:
0
Body camera police can be used by hackers and criminals

Body camera police can be used by hackers and criminals

police around the world today wear body cameras. They are a useful tool that protects police, protects citizens from illegal actions of law enforcement officers, helps to fight corruption and acts as a proof of violations. But a c...

156

1 0

2018-08-14

Comments:
0
Users of computers began to threaten the publication of personal videos and browser history

Users of computers began to threaten the publication of personal videos and browser history

computer Users around the world have started to receive e-mails from Scam to extort money. Depending on who sent the letter, its contents may change. However, colleagues from Business Insider was able to extract common features in...

156

1 0

2018-07-25

Comments:
0
The hacker stole the files of the U.S. army, but could not sell them even for $ 150

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

202

1 0

2018-07-11

Comments:
0
The hacker group seized control of satellites and operators

The hacker group seized control of satellites and operators

Researchers in the security area of Symantec Corp. discovered a sophisticated hacking campaign launched from computers in China. Hackers penetrated the computers of satellite operators, defense contractors and telecommunications c...

142

1 0

2018-06-20

Comments:
0
Half a million routers can be turned off VPNFilter

Half a million routers can be turned off VPNFilter

Researchers in the field of security recently discovered that at least 500 thousand routers in service among ordinary users and companies infected by malware VPNFilter, the previous version which was previously spread on the terri...

206

1 0

2018-05-24

Comments:
0
More than 30 major IT companies sign

More than 30 major IT companies sign "a digital Geneva Convention"

the New York Times reports that more than 30 technology companies including Facebook and Microsoft plan to announce the statement, according to which they publicly refuse to participate in cyber attacks organized by the government...

235

1 0

2018-04-18

Comments:
0
Hacked YouTube and deleted the most popular movie

Hacked YouTube and deleted the most popular movie

Right now the hacker group calling itself Prosox and Kuroi'sh, hacking YouTube and change the names of the most popular music videos Vevo. Under the "distribution" you have the most viewed video clip for the song "Despacito" Puert...

262

1 0

2018-04-10

Comments:
0
Vulnerability in Cisco IOS left users without Internet

Vulnerability in Cisco IOS left users without Internet

currently, a powerful botnet attack. All Internet addresses are scanned for the presence of fresh vulnerabilities in the software of the Cisco IOS that allows you to remotely execute commands on Cisco devices. The bot walks to the...

309

1 0

2018-04-06

Comments:
0
Russian accused of hacking into LinkedIn, was extradited to the US

Russian accused of hacking into LinkedIn, was extradited to the US

the Russian, who is accused of hacking into LinkedIn, Dropbox and Formspring, as well as in compromised personal data of more than 100 million users, has been extradited to the United States after a 15-month detention in Prague, T...

222

1 0

2018-03-31

Comments:
0
Elon Musk has removed the page of Tesla and SpaceX on Facebook

Elon Musk has removed the page of Tesla and SpaceX on Facebook

Mass action «Remove Facebook» (#deletefacebook) continues to gain momentum. Dissatisfied with the large-scale leak of personal data of users of the social network urge everyone to boycott Facebook. The action is supporte...

252

1 0

2018-03-23

Comments:
0
The student hacked into a secure crypto Ledger

The student hacked into a secure crypto Ledger

A cryptocurrency asset perfectly cost software wallets, which create on computers. But some believe that it is unsafe, so they use hardware wallets, which is a small dongle that can be connected to computer or not to do without it...

282

1 0

2018-03-21

Comments:
0
Viruses-the miners have learned to eliminate the competition

Viruses-the miners have learned to eliminate the competition

still, all this fuss with contamination and extraction by using the cryptocurrency looked like something not very serious. Cyber criminals have introduced a program-miners on various sites, programs, or install them on your PC, af...

279

1 0

2018-03-07

Comments:
0
New victim of the miners became a torrent client

New victim of the miners became a torrent client

Researchers from cybersecurity company F5 spoke about a new way of hidden prey . This time hackers were able to access the free console torrent client rTorrent. Because before the application of the vulnerability, attackers could ...

230

1 0

2018-03-03

Comments:
0
Avast has developed an AI system for the protection of IoT from the rest of the miners

Avast has developed an AI system for the protection of IoT from the rest of the miners

Hidden cryptocurrency is starting to become more rampant. Hackers earn money using for mining other people's computers, smartphones and other «smart» device. At the world mobile Congress company Avast said about the exte...

270

1 0

2018-03-02

Comments:
0
Microsoft Word became assistant of

Microsoft Word became assistant of "black" miners

Hackers wish to get hold of the cryptocurrency at the expense of others, do not stop by any means trying to use any, even the most dubious loophole to access the capacities of other computers. This time the attackers used a new tr...

235

1 0

2018-02-23

Comments:
0
Hackers mainile cryptocurrency cloud account Tesla

Hackers mainile cryptocurrency cloud account Tesla

Hackers broke into the account of Tesla in the cloud Amazon Web Services and set up the cloud on cryptocurrency — according to the company Redlock, specializing in cyber security. Access account Tesla hackers were able to ob...

259

1 0

2018-02-21

Comments:
0
In the Telegram discovered a vulnerability that allows hackers to mine cryptocurrencies

In the Telegram discovered a vulnerability that allows hackers to mine cryptocurrencies

using the popular Telegram messenger hackers almost a year had the ability to access users ' computers, infecting a PC with malware capable of covertly produce . About the problem reported «Kaspersky Lab», which experts ...

275

1 0

2018-02-14

Comments:
0
Hackers have infected miner public sites US and UK

Hackers have infected miner public sites US and UK

Followed by sites with high traffic and YouTube attacks «black miners» were the sites of state bodies of the USA and the UK. Expert on cyber security Scott Helme reports that at this point in latent production involved t...

256

1 0

2018-02-12

Comments:
0
In hardware crypto Ledger discovered a critical vulnerability

In hardware crypto Ledger discovered a critical vulnerability

it is considered that the crypto hardware wallets are very reliable, and therefore better suited to store their savings and conducting various transactions. One of the most successful devices in the past year were French hardware ...

263

1 0

2018-02-04

Comments:
0