Friday, 9 August 2019

Apple will now pay hackers up to $1 million for reporting vulnerabilities

The Hacker News Daily Updates
Newsletter
cover

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks

Identify vulnerabilities and improve security in the cryptocurrency lifecycle.

Download Now Sponsored
LATEST NEWS Aug 9, 2019

Apple will now pay hackers up to $1 million for reporting vulnerabilities

Apple has just updated the rules of its bug bounty program by announcing a few major changes during a briefing at the annual Black Hat security conference yesterday. One of the most attractive updates is… Apple has enormously increased the maximum reward for its bug bounty program from $200,000 ...

Read More
Twitter Facebook LinkedIn

Facebook Sues Two Android App Developers for Click Injection Fraud

Facebook has filed a lawsuit against two shady Android app developers accused of making illegal money by hijacking users' smartphones to fraudulently click on Facebook ads. According to Facebook, Hong Kong-based 'LionMobi' and Singapore-based 'JediMobi' app developers were distributing malicious ...

Read More
Twitter Facebook LinkedIn

Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-V

Remember the Reverse RDP Attack? Earlier this year, researchers disclosed clipboard hijacking and path-traversal issues in Microsoft's Windows built-in RDP client that could allow a malicious RDP server to compromise a client computer, reversely. (You can find details and a video demonstration ...

Read More
Twitter Facebook LinkedIn

Binance KYC Data Leak — Crypto Exchange Sets $290,000 Bounty On Blackmailer

Malta-based cryptocurrency exchange Binance has become a victim of a ransom demand from a scammer who claimed to have hacked the KYC (Know Your Customer) data of thousands of its customers. The unknown attacker threatened the world's largest cryptocurrency exchange by volume to release KYC ...

Read More
Twitter Facebook LinkedIn

KDE Linux Desktops Could Get Hacked Without Even Opening Malicious Files

If you are running a KDE desktop environment on your Linux operating system, you need to be extra careful and avoid downloading any ".desktop" or ".directory" file for a while. A cybersecurity researcher has disclosed an unpatched zero-day vulnerability in the KDE software framework that could ...

Read More
Twitter Facebook LinkedIn
cover

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks

Identify vulnerabilities and improve security in the cryptocurrency lifecycle.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment