Wednesday, 7 December 2016

North Korea's Linux-based Red Star OS can be Hacked Remotely with just a Link

The Hacker News Daily Updates
Newsletter
cover

Build An Insider Threat Program in 90 Days

A guide for initiating, developing and implementing your Insider Threat Program.

Download Now Sponsored
LATEST NEWS Dec 7, 2016

Hacking Millions with Just an Image — Recipe: Pixels, Ads & Exploit Kit

If you have visited any popular mainstream website over the past two months, your computer may have been infected — Thanks to a new exploit kit discovered by security researchers. Researchers from antivirus provider ESET released a report on Tuesday stating that they have discovered an exploit ...

Read More
Twitter Facebook LinkedIn

North Korea's Linux-based Red Star OS can be Hacked Remotely with just a Link

North Korea's own homegrown computer operating system, that's supposed to be fully hacker proof and more secure than foreign OS, like Microsoft's Windows, can easily be hacked remotely. A group of hackers managed to break into Red Star OS — North Korea's government sanctioned Linux-based OS — ...

Read More
Twitter Facebook LinkedIn

[Video] How to Hack a Credit Card in 6 Seconds, Experts Reveal

As India attempts an upgrade to a cashless society, cyber security experts have raised serious concerns and revealed how to find credit card information – including expiration dates and CVV numbers – in just 6 Seconds. And what's more interesting? The hack uses nothing more than guesswork by ...

Read More
Twitter Facebook LinkedIn

DailyMotion Hacked — 85 Million User Accounts Stolen

Another day, another data breach. This time a popular video sharing platform DailyMotion has allegedly been hacked and tens of millions of users information have been stolen. Breach notification service LeakedSource announced the data breach on Monday after the company obtained 85.2 Million ...

Read More
Twitter Facebook LinkedIn

Rule 41 — FBI Gets Expanded Power to Hack any Computer in the World

Hacking multiple computers across the world just got easier for the United States intelligence and law enforcement agencies from today onwards. The changes introduced to the Rule 41 of the Federal Rules of Criminal Procedure by the United States Department of Justice came into effect on Thursday, ...

Read More
Twitter Facebook LinkedIn
cover

Build An Insider Threat Program in 90 Days

A guide for initiating, developing and implementing your Insider Threat Program.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment