Tag Hackers - results: 32

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

46

1 0

2018-07-11

Comments:
0
The hacker group seized control of satellites and operators

The hacker group seized control of satellites and operators

Researchers in the security area of Symantec Corp. discovered a sophisticated hacking campaign launched from computers in China. Hackers penetrated the computers of satellite operators, defense contractors and telecommunications c...

69

1 0

2018-06-20

Comments:
0
Half a million routers can be turned off VPNFilter

Half a million routers can be turned off VPNFilter

Researchers in the field of security recently discovered that at least 500 thousand routers in service among ordinary users and companies infected by malware VPNFilter, the previous version which was previously spread on the terri...

111

1 0

2018-05-24

Comments:
0
More than 30 major IT companies sign

More than 30 major IT companies sign "a digital Geneva Convention"

the New York Times reports that more than 30 technology companies including Facebook and Microsoft plan to announce the statement, according to which they publicly refuse to participate in cyber attacks organized by the government...

118

1 0

2018-04-18

Comments:
0
Hacked YouTube and deleted the most popular movie

Hacked YouTube and deleted the most popular movie

Right now the hacker group calling itself Prosox and Kuroi'sh, hacking YouTube and change the names of the most popular music videos Vevo. Under the "distribution" you have the most viewed video clip for the song "Despacito" Puert...

134

1 0

2018-04-10

Comments:
0
Vulnerability in Cisco IOS left users without Internet

Vulnerability in Cisco IOS left users without Internet

currently, a powerful botnet attack. All Internet addresses are scanned for the presence of fresh vulnerabilities in the software of the Cisco IOS that allows you to remotely execute commands on Cisco devices. The bot walks to the...

177

1 0

2018-04-06

Comments:
0
Russian accused of hacking into LinkedIn, was extradited to the US

Russian accused of hacking into LinkedIn, was extradited to the US

the Russian, who is accused of hacking into LinkedIn, Dropbox and Formspring, as well as in compromised personal data of more than 100 million users, has been extradited to the United States after a 15-month detention in Prague, T...

115

1 0

2018-03-31

Comments:
0
Elon Musk has removed the page of Tesla and SpaceX on Facebook

Elon Musk has removed the page of Tesla and SpaceX on Facebook

Mass action «Remove Facebook» (#deletefacebook) continues to gain momentum. Dissatisfied with the large-scale leak of personal data of users of the social network urge everyone to boycott Facebook. The action is supporte...

156

1 0

2018-03-23

Comments:
0
The student hacked into a secure crypto Ledger

The student hacked into a secure crypto Ledger

A cryptocurrency asset perfectly cost software wallets, which create on computers. But some believe that it is unsafe, so they use hardware wallets, which is a small dongle that can be connected to computer or not to do without it...

164

1 0

2018-03-21

Comments:
0
Viruses-the miners have learned to eliminate the competition

Viruses-the miners have learned to eliminate the competition

still, all this fuss with contamination and extraction by using the cryptocurrency looked like something not very serious. Cyber criminals have introduced a program-miners on various sites, programs, or install them on your PC, af...

190

1 0

2018-03-07

Comments:
0
New victim of the miners became a torrent client

New victim of the miners became a torrent client

Researchers from cybersecurity company F5 spoke about a new way of hidden prey . This time hackers were able to access the free console torrent client rTorrent. Because before the application of the vulnerability, attackers could ...

156

1 0

2018-03-03

Comments:
0
Avast has developed an AI system for the protection of IoT from the rest of the miners

Avast has developed an AI system for the protection of IoT from the rest of the miners

Hidden cryptocurrency is starting to become more rampant. Hackers earn money using for mining other people's computers, smartphones and other «smart» device. At the world mobile Congress company Avast said about the exte...

193

1 0

2018-03-02

Comments:
0
Microsoft Word became assistant of

Microsoft Word became assistant of "black" miners

Hackers wish to get hold of the cryptocurrency at the expense of others, do not stop by any means trying to use any, even the most dubious loophole to access the capacities of other computers. This time the attackers used a new tr...

164

1 0

2018-02-23

Comments:
0
Hackers mainile cryptocurrency cloud account Tesla

Hackers mainile cryptocurrency cloud account Tesla

Hackers broke into the account of Tesla in the cloud Amazon Web Services and set up the cloud on cryptocurrency — according to the company Redlock, specializing in cyber security. Access account Tesla hackers were able to ob...

180

1 0

2018-02-21

Comments:
0
In the Telegram discovered a vulnerability that allows hackers to mine cryptocurrencies

In the Telegram discovered a vulnerability that allows hackers to mine cryptocurrencies

using the popular Telegram messenger hackers almost a year had the ability to access users ' computers, infecting a PC with malware capable of covertly produce . About the problem reported «Kaspersky Lab», which experts ...

144

1 0

2018-02-14

Comments:
0
Hackers have infected miner public sites US and UK

Hackers have infected miner public sites US and UK

Followed by sites with high traffic and YouTube attacks «black miners» were the sites of state bodies of the USA and the UK. Expert on cyber security Scott Helme reports that at this point in latent production involved t...

177

1 0

2018-02-12

Comments:
0
In hardware crypto Ledger discovered a critical vulnerability

In hardware crypto Ledger discovered a critical vulnerability

it is considered that the crypto hardware wallets are very reliable, and therefore better suited to store their savings and conducting various transactions. One of the most successful devices in the past year were French hardware ...

194

1 0

2018-02-04

Comments:
0
Proxy service for Tor browser stole users ' Bitcoins

Proxy service for Tor browser stole users ' Bitcoins

security Experts from Proofpoint, the company conducted an investigation, which found that proxies onion.top which allows you to access the Tor network from a standard web browser, substitute the address of the bitcoin wallets and...

170

1 0

2018-01-31

Comments:
0
We were watching YouTube, the scammers mainily on our PC

We were watching YouTube, the scammers mainily on our PC

While you are engaged in watching videos on YouTube, your personal computers and other gadgets, probably secretly mainily for attackers. About this cyber safety specialist Troy Marsh. Marsh writes that for mining in this case we...

181

1 0

2018-01-27

Comments:
0

"Kaspersky lab" has detected a Trojan stealing bitcoin

Experts «Kaspersky Lab» found Trojan Mezzo, substituting the details in the file exchange between the Bank and accounting systems. Malicious software attacks the fresh text files accounting software. If after a few minut...

267

1 0

2018-01-26

Comments:
0