Tuesday 23 May 2017

Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2

The Hacker News Daily Updates
Newsletter
cover

Cybersecurity Fundamentals - Risks, Procedures, & Integration

The core of the Internet is getting weaker as we connect ever more of our lives - phones, tablets, cars, refrigerators - to it. Meanwhile, the attacks are getting stronger.

Download Now Sponsored
LATEST NEWS May 23, 2017

18-Byte ImageMagick Hack Could Have Leaked Images From Yahoo Mail Server

After the discovery of a critical vulnerability that could have allowed hackers to view private Yahoo Mail images, Yahoo retired the image-processing library ImageMagick. ImageMagick is an open-source image processing library that lets users resize, scale, crop, watermarking and tweak images. The ...

Read More
Twitter Facebook LinkedIn

Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2

A security researcher has identified a new strain of malware that also spreads itself by exploiting flaws in Windows SMB file sharing protocol, but unlike the WannaCry Ransomware that uses only two leaked NSA hacking tools, it exploits all the seven. Last week, we warned you about multiple hacking ...

Read More
Twitter Facebook LinkedIn

Netgear Now Collects Router 'Analytics Data' — Here's How to Disable It

Is your router collects data on your network? Netgear last week pushed out a firmware update for its wireless router model NightHawk R7000 with a remote data collection feature that collects router's analytics data and sends it to the company's server. For now, the company has rolled out the ...

Read More
Twitter Facebook LinkedIn

Google Adds New Behavior-Based Malware Scanner To Every Android Device

In order to keep its billions of users safe, Google has introduced another security defense for its Android devices, called Google Play Protect. Google Play Protect, which is part of the Google Play Store app, uses machine learning and app usage analysis to weed out the dangerous and malicious ...

Read More
Twitter Facebook LinkedIn

More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry

Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools – allegedly belonged to the NSA's elite hacking team Equation Group – several hacking groups and individual hackers have started using them in their own way. The April's data dump was believed to be the most ...

Read More
Twitter Facebook LinkedIn
cover

Cybersecurity Fundamentals - Risks, Procedures, & Integration

The core of the Internet is getting weaker as we connect ever more of our lives - phones, tablets, cars, refrigerators - to it. Meanwhile, the attacks are getting stronger.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment