Thursday 1 June 2017

US Defense Contractor left Sensitive Files on Amazon Server Without Password

The Hacker News Daily Updates
Newsletter
cover

Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS - and What to Do About It

Cyber ransom attacks are on the rise. This eBook outlines the current threat environment/attack tools and why ransom attacks are growing in popularity.

Download Now Sponsored
LATEST NEWS Jun 1, 2017

Online Training for CISA, CISM, and CISSP Cyber Security Certifications

Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber ...

Read More
Twitter Facebook LinkedIn

High-Severity Linux Sudo Flaw Allows Users to Gain Root Privileges

A high-severity vulnerability has been reported in Linux that could be exploited by a low privilege attacker to gain full root access on an affected system. The vulnerability, identified as CVE-2017-1000367, was discovered by researchers at Qualys Security in Sudo's "get_process_ttyname()" ...

Read More
Twitter Facebook LinkedIn

US Defense Contractor left Sensitive Files on Amazon Server Without Password

Sensitive files linked to the United States intelligence agency were reportedly left on a public Amazon server by one of the nation's top intelligence contractor without a password, according to a new report. UpGuard cyber risk analyst Chris Vickery discovered a cache of 60,000 documents from a US ...

Read More
Twitter Facebook LinkedIn

LinkedIn Hacker, Wanted by US & Russian, Can be Extradited to Either State

The alleged Russian hacker, who was arrested by the Czech police in Prague last October on suspicion of massive 2012 data breach at LinkedIn, can be extradited to either the United States or Russia, a Czech court ruled on Tuesday. Yevgeniy Aleksandrovich Nikulin, a 29-years-old Russian national, ...

Read More
Twitter Facebook LinkedIn

Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication

What if your laptop is listening to everything that is being said during your phone calls or other people near your laptop and even recording video of your surrounding without your knowledge? Sounds really scary! Isn't it? But this scenario is not only possible but is hell easy to accomplish. A ...

Read More
Twitter Facebook LinkedIn
cover

Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS - and What to Do About It

Cyber ransom attacks are on the rise. This eBook outlines the current threat environment/attack tools and why ransom attacks are growing in popularity.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment