Tag Hacking - results: 8

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

46

1 0

2018-07-11

Comments:
0
The hacker group seized control of satellites and operators

The hacker group seized control of satellites and operators

Researchers in the security area of Symantec Corp. discovered a sophisticated hacking campaign launched from computers in China. Hackers penetrated the computers of satellite operators, defense contractors and telecommunications c...

69

1 0

2018-06-20

Comments:
0
What have you learned about the attack on 200 000 network of Cisco switches?

What have you learned about the attack on 200 000 network of Cisco switches?

the Last few days were not the best for cyber security. The Iranian Ministry of communications and information technologies reported that it has also become a victim of global cyber-attacks that (or simply switches) from Cisco, wh...

128

1 0

2018-04-08

Comments:
0
Russian accused of hacking into LinkedIn, was extradited to the US

Russian accused of hacking into LinkedIn, was extradited to the US

the Russian, who is accused of hacking into LinkedIn, Dropbox and Formspring, as well as in compromised personal data of more than 100 million users, has been extradited to the United States after a 15-month detention in Prague, T...

115

1 0

2018-03-31

Comments:
0
Rostov hacker hacked PayPal

Rostov hacker hacked PayPal

Despite the development of new methods of cyber security, e-wallets and payment systems will always be a tasty morsel for hackers and other dishonest people that live on the world wide web. Have repeatedly made attempts of hacking...

378

1 0

2018-01-17

Comments:
0
A serious vulnerability in Intel processors can lead to data leakage

A serious vulnerability in Intel processors can lead to data leakage

Programmers who first discovered the vulnerability, which writes the edition , reporting that it allows any software, including viruses, to access passwords, usernames and other confidential user information. The scale of the prob...

260

1 0

2018-01-03

Comments:
0
Hackers demand from the creators of

Hackers demand from the creators of "Game of thrones" $ 6 million in bitcoins

a Few days ago, the Internet community stirred up information about what an unknown group managed to steal from the HBO huge amount of confidential information including yet not aired a series of television series "Game of thrones...

314

1 0

2017-08-08

Comments:
0
Created the image of the

Created the image of the "universal fingerprint" that can fool most sensors

fingerprint Scanners are no longer a novelty on the market of mobile electronics. They are primarily designed to provide additional security for user data, but a 100% guarantee against unauthorized entry, of course, can not give. ...

242

1 0

2017-04-18

Comments:
0