The largest repository of hacker activity and vulnerability data on display » Get the Report from HackerOne!
Welcome Guest | Sign In
TechNewsWorld.com

Results 1-20 of 1327 for hacker (0.002 secs).

Searching: Articles | Discussions

Sorted by Date | Sort by Relevance

Jack M. Germain
Android Apps Riskier Than Ever: Report
09/12/18 12:08 PM PT | LinuxInsider | 2072 Words

The researchers highlighted the complacency that many app providers have exhibited in failing to keep their software adequately protected against known open source vulnerabilities that leave consumers, businesses and governments open to hacker attacks, with potentially disastrous results.

Note: Google routinely...

John P. Mello Jr.
Def Con Voting Machine Hacks Ruffle Feathers
08/14/18 7:33 AM PT | E-Commerce Times | 1024 Words

One of the largest providers of election equipment in the United States, ES&S, sent an email to its customers advising them that it was highly unlikely that any hacker would be able to get the physical access to a voting machine that...

Jonathan Terrasi
Can Hackers Crack the Ivory Towers?
06/19/18 7:00 AM PT | LinuxInsider | 1011 Words

"In the academic community, it's all about getting tenure, and you do that by getting published in a subset of serious journals and speaking at a subset of what they call 'top conferences,'" she explained. "For the hacker world ... it could...

Jonathan Terrasi
DevOps: Plenty of Devs, Not Enough Ops
05/29/18 9:20 AM PT | LinuxInsider | 933 Words

In his presentation at the third iteration of the CypherCon hacker conference held last month in Milwaukee, Bryan described an anonymized engagement in which he probed the network of a development team responsible for 1.2 million user accounts. His purpose was to...

John P. Mello Jr.
FBI Declaws Russian Fancy Bear Botnet
05/25/18 5:00 AM PT | TechNewsWorld | 877 Words

The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers made by Linksys, MikroTik, Netgear and TP-Link, as well as QNAP network-attached storage devices.

VPN Filter is "particularly concerning"...

David Jones
Amazon's Latest Delivery Scheme Involves Handing Over Your Car Keys
04/25/18 11:26 AM PT | E-Commerce Times | 609 Words

If the Amazon service has the proper encryption, then a hacker cannot just use a "sniff and replay" attack to access the system, noted Brian Martin, vice president of vulnerability intelligence at Risk Based Security .

However, this type of technology...

John P. Mello Jr.
'Holy Grail' Exploit Puts Nintendo Switch Consoles at Risk
04/25/18 10:30 AM PT | TechNewsWorld | 652 Words

"Of course, there is a defense to some degree in unmodifiability, but that always presupposes that no flaws exist," he continued," and as we see in this attack, there are a number of smart hacker types in the community determined to find...

John P. Mello Jr.
Researcher Cracks 'Hacker-Proof' Crypto Wallet
03/22/18 11:11 AM PT | TechNewsWorld | 642 Words

A hardware wallet for virtual currencies with millions of users has been compromised by a 15-year-old security researcher. Saleem Rashid explained...

John P. Mello Jr.
Risky Scripts Pose Threat to Web Surfers, Say Researchers
11/28/17 11:24 AM PT | TechNewsWorld | 1166 Words

That makes the playback page vulnerable to a man-in-middle attack that could suck all the data from the page and into a hacker's hands.

What's more, some services don't use HTTPS to communicate with their clients, which exposes the transmissions to...

Jack M. Germain
RoboCyberWall Aims to Block Linux Server Hacks
10/04/17 4:30 PM PT | LinuxInsider | 825 Words

The product's Modular Security paradigm for Linux server perimeters has been hacker tested for more than a year. It is far more secure than yesterday's all-in-one firewalls, according to the company, which describes them as "Jack of All Trades, Master of None."...

Jonathan Terrasi
Linux: Come for the Kernel, Stay for the Popcorn
09/20/17 3:22 PM PT | LinuxInsider | 921 Words

One example of this is the predominantly Linux-focused podcast Hacker Public Radio . The series has no designated host, instead calling on listeners to submit episodes for the benefit of the rest of the audience.

In this way, community members don't merely...

David Jones
Apache Mounts Strong Defense, Equifax Retreats
09/12/17 11:14 AM PT | LinuxInsider | 772 Words

Actual breaches are not preventable, he noted, as a skilled hacker who wants to access your personal data will do so if they try hard enough -- but that was not the problem in the Equifax case.

Storing consumer financial data...

John P. Mello Jr.
Global Cyberattack on Energy Sector Stokes Deep Fears
09/07/17 11:11 AM PT | TechNewsWorld | 670 Words

... hacker group known as "Dragonfly" is behind sophisticated wave of recent cyberattacks on the energy sectors of Europe and North America, Symantec reported Wednesday. The attacks could provide the group with the means to severely disrupt energy operations on both continents.

...

Peter Suciu
HBO Cyberattack Driven By Mysterious Motives
08/03/17 1:11 PM PT | TechNewsWorld | 828 Words

"Unless HBO's hackers release more damaging or controversial data, or are aided by Wikileaks, this event is likely to be less disruptive than the Sony hack," he observed. "That said, it should still inspire Netflix, Amazon and others in the entertainment and film industries to examine and shore up their network security -- or be the next in line to be hacker targets." ...

Jonathan Terrasi
Hacking and Linux Go Together Like 2 Keys in a Key Pair
05/31/17 3:16 PM PT | LinuxInsider | 1084 Words

... since taking an interest Linux , with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on...

David Jones
Microsoft Bashes NSA Following Massive Ransomware Attacks
05/15/17 4:15 PM PT | E-Commerce Times | 903 Words

The German Deutsche Bahn rail system largely has recovered from an attack of the initial strain of Wannacry, which caused electronic departure boards to display the hacker's ransom demands, according to Lutz Miller, spokesperson for the rail service.

Train operations...

Jonathan Terrasi
What Internet-Connected War Might Look Like
05/10/17 5:00 AM PT | LinuxInsider | 1008 Words

This might sound like the action movie of a hacker's dreams, but The Army Cyber Institute at West Point is training its recruits to do just that. At Chicago's Thotcon hacker conference last week, attendees got a glimpse of what its elite...

Peter Suciu
Our Sci-Fi Future: Silly vs. Terrifying
04/25/17 5:00 AM PT | TechNewsWorld | 1467 Words

Case, the main character in Gibson's seminal book Neuromancer , is a "console cowboy" -- basically a hacker by another, more creative name. The character is down on his luck, and by taking on a job no one wants, he is able...

John P. Mello Jr.
Microsoft's Timely Response to Shadow Brokers Threat Raises Questions
04/18/17 9:58 AM PT | TechNewsWorld | 879 Words

... as the Shadow Brokers hacker group started crowing about a dump of never-seen-before flaws in Windows, Microsoft announced it already had fixed most of the exploits. "Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers," Microsoft Principal...

John P. Mello Jr.
Hackers Blast Emergency Sirens in Dallas
04/11/17 5:00 AM PT | TechNewsWorld | 830 Words

Screaming sirens serenaded Dallas residents in the early morning hours Saturday after a cyberattack set off the city's emergency warning system....

1 2 3 4 5 6 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What best describes your attitude toward social networks and politics?
The value of engaging in serious political discourse outweighs the negatives.
Most of the political conversations seem overheated and ignorant.
Social networks provide a lot of very good political information from reliable sources.
Almost every political post I see is skewed or totally fake.
Political interactions on social networks simply mirror those in the real world.
Social networks remove inhibitions, bringing out the worst in people and politics.