Hackers

Read about hackers, The latest news, videos, and discussion topics about hackers from alibabacloud.com

Play security card Qihoo 360 into the Intelligent routing field

Absrtact: The banner of safety, Qihoo 360 officially opened the internet's upstream intelligent route and the intelligent home market. May 6, Qihoo 360 announced its smart hardware new 360 security routing booking activities officially opened, the price of 99 yuan.   360 official elimination of "security" banner, Qihoo 360 officially opened the internet upstream access-intelligent routing and the resulting smart home market.   May 6, Qihoo 360 announced its smart hardware new 360 security routing booking activities officially opened, the price of 99 yuan. ...

ebay attacked, fake risk

The main security researchers have called on ebay to take immediate action against dangerous goods, as the issue continues to threaten its users, the BBC website reported recently. Currently, the BBC has determined that more than 100 items on ebay are being used to deceive users into handing over personal data. And ebay said it would "continue to review all site features and content." "According to a BBC survey, many of the user accounts with 100% praise and sales of hundreds of items were hijacked and sold for fakes; 二、一位 account was robbed ...

Microsoft IIS6 Vulnerability: Server sensitive information easily stolen

Security experts recently warned administrators using Microsoft Internet Information Services IIS 6 that Web servers are vulnerable to attacks and expose password-protected files and folders. It is reported that this vulnerability exists in some process commands based on WebDAV protocol. By adding some Unicode characters to the Web address, hackers can access these sensitive files, which are generally protected by a system password. In addition, the vulnerability can be used to upload malicious files to the server. Nikolaos Rangos safety researcher said, "W ...

Hackers and security services will be the most sought-after industry in the future

The first day of work is still as boring as usual, in addition to knocking on the keyboard is the keyboard! will be off work when a small episode, to today's boring painting on a complete stop! -----OK, I admit I am lazy, near the end of work half an hour to avoid drinking drinks. But the company is going to be lazy. Next to the operation of the two beautiful women are also lazy! Listen, they seem to be talking about something. Miss: Little meow, you say what industry will fire in the next few years, the recent intention to job-hopping has been considering this issue. Miss Meow: Well, in the next few years things ...

Smart home: Hiding huge security risks

Absrtact: If, not as soon as possible to reverse the entire industrial chain to the safety of the knowledge, smart home and even the internet may be a huge hidden dangers. This is not alarmism thrillers listen.   April 4, 2014, I have an exchange with the Kang Xiaoning Vice president of technology, the following for the dialogue if, not as soon as possible to reverse the entire industrial chain to the safety of the knowledge, smart home and even the internet may be a huge hidden dangers.   This is not alarmism thrillers listen. April 4, 2014, I have an exchange with the Kang Xiaoning vice president of the technology, the following for the dialogue to organize: talk about ...

12306 Web site calls for users to find the most vulnerable to a reward of 2000 yuan

Absrtact: In recent days, 12306 of Web site user data leaked to become the focus of public attention, railway police quickly captured leaked suspects. Yesterday 12306 Web sites have joined the world's largest vulnerability response platform to start bug fixes. Website Supervisor China Railway Science in recent days, 12306 of Web site user data leaked to become the focus of public attention, railway police quickly captured the leak suspect. Yesterday 12306 Web sites have joined the world's largest vulnerability response platform to start bug fixes. Web site Director of the Chinese Academy of Railway Science, the highest reward 2000 yuan, called Netizens to check ...

75% of respondents said their company was hit by cyber attacks last year.

According to the report, in a survey of 2,100 information technology executives around the world, 75% per cent said their company had been hit by cyber attacks last year, with most cyber attacks designed to steal corporate intellectual property, such as product design. "We saw some companies go bankrupt because of intellectual property theft, so it's a matter of life and death in some ways," said Maureen Kelly, a senior corporate executive responsible for product marketing. Symantec points out that it is increasingly difficult to secure data security for the enterprise, in response to the global economy ...

Bomb-level leaks, internet companies sleepless nights

Absrtact: April 8, 2014, the day when XP announced the official cessation of service, it was also the day when Openssl burst into big holes. All afternoon we were in a state of emergency, mentally tense, a vulnerability that affected the 30–50% ratio using HTTPS's Web site, including the days when the official stop of service was announced by April 8, 2014, when XP was Openssl. All afternoon we were in a state of emergency, mentally tense, ...

Chengmenthe implicating Sony anti-Black to the players

Sony recently launched an onslaught against PS3 cracking activities, will crack the hacker George Hoze (net name Geohot) sued court and confiscated his possessions, the new round of firepower may also hurt those who visited the PS3 site and the forum of ordinary players. Sony's subpoena requires coverage of Holtz's personal website geohot.com as well as his YouTube account, and even Holtz's accounts on tweet and Psx-scene. This means that all of these addresses have been visited and posted on tweet or forums ...

"Gossip Girl" suspects more pornographic photos leaked hacker ridicule rumor

Levelly's "pornographic" still continues (1/9) Beijing time June 3 News, the recent spate of "Gossip Girl" Levelly-Blake Lively has seen a new development, with Blackburn, its spokesmen and friends denying the "body" in the photo.  After that, the hacker who released the nude photo added more than 10 new photos and cynically scoffed at the statement made by the spokesman. -... actress Blake, who was famous for her gossip Girl.

Zhong Eye-web space search engine

Know Chuang Yu's network space search engine: Zhong eyes officially open to the outside, the following is to know the original text of the announcement: everyone good, long time no see, there are many friends say I do not update, is such: 1. I'm focusing on more important things; 2. We this public number audience distribution is quite strange, some dongdong refrained from hair, has the saliva, but we already prepared some mouth to fight the water war preparation; 3. After this public number not only I write, know the creation of the safety research team of students are also in preparation, but not I come fast, after all, I am sick to in such a busy situation ...

Nuclear-level loopholes, internet companies sleepless night, netizens are still in the dark

Absrtact: April 8, 2014, the day when XP announced the official cessation of service, it was also the day when Openssl burst into big holes. All afternoon we were in a state of emergency, mentally tense, a vulnerability that affected the 30–50% ratio using HTTPS's Web site, including the days when the official stop of service was announced by April 8, 2014, when XP was Openssl. All afternoon we are in a state of emergency, mental tension, this vulnerability affects 30-5 ...

US hacker releases crack tool 30 sec cracked 3GS iphone

Beijing time October 13 morning news, according to foreign media reported today, the United States hacker George Hoze (George Hotz) issued a name for the blackra1n 3GS version of the iphone crack tool.  Using this tool software, users can crack 3GS iphone in 30 seconds. The iphone can only run on a designated mobile operator's network, and it can only run software approved by Apple. Blackra1n and other cracking tools to enable the iphone to run from Cydia and other unofficial applications ...

OpenSSL big leak exposure

Summary: Is it possible to cause network chaos? After repeatedly modifying my own questions, I clicked on the send. A moment later, a reply out of the dialog box has now been messed up. After that, it was a long silence. Is it obvious that the top white hat across the internet is likely to lead to cyber chaos?   "I clicked" send "after repeatedly modifying my own question. A moment later, a reply in the dialog box "is now in turmoil."   After that, it was a long silence. Obviously, the top white hat opposite the Internet.

Independent Internet security researcher has found a new vulnerability in Microsoft Internet Explorer

According to foreign media reports, an Italian independent Internet security researcher named Rosario Varotta (Rosario Valotta) found a new loophole in Microsoft Internet Explorer, which is said to have exploited the vulnerability to steal cookies that record user names and passwords used to access the site. He calls that hacking technology "cookiejacking". Varota said: "Any Web site, any cookie can be stolen through the cookiejacking technology." Only you can not imagine, there is no it can not do. ...

Nuclear-level loopholes, internet companies sleepless night, netizens are also

Absrtact: April 8, 2014, the day when XP announced the official cessation of service, it was also the day when Openssl burst into big holes. All afternoon we were in a state of emergency, mentally tense, a vulnerability that affected the 30–50% ratio using HTTPS's Web site, including the days when the official stop of service was announced by April 8, 2014, when XP was Openssl. All afternoon we were in a state of emergency, mentally tense, this leak ...

"A path to lead a serial murder" of the Four "Hello, Ko Handsome"

The next morning, the first thing to work of course can be the landing server to see the results of the export. I found 1127 logs, and I sorted the logs in ascending order of time. The first thing you have to decide is whether the IP is a common proxy--that is, it's not a lot of people using it. I checked the user in the log and the user in the OpenShift on Apache, exactly the same. The system language is Chinese--is the domestic underground. Let's entertain what the hacker has done recently: 2013-10-...

Cloud computing is actually safer

Users who have just come in contact with the concept of cloud computing, the first reaction is always-is it safe? After some understanding of cloud computing, users always say that security is like the shortest piece of wood on cloud computing bucket, the reason why cloud computing this bucket of water is not satisfied, is safe this plank is too short. Is security really the shortest piece of wood on the cloud computing bucket? Only in the context of cloud computing can security be truly provided to the user as a service.   The security architecture of cloud computing is deeply defensive of the security risks that may arise. A recent cloud computing survey also confirms the user's ...

The litters regiment has been hacked.

Absrtact: A few days ago Sina Weibo because of a large-scale virus attack, causing the system to appear a large number of malicious links. Just 3 days after the attack on Sina Weibo, another group of new-litters groups has fallen into a similar position. In order to promote the promotion, the litters group plans a few days ago Sina Weibo because of the massive virus attack, causes the system to appear the massive malicious link. Just 3 days after the attack on Sina Weibo, another group of new-litters groups has fallen into a similar position. In order to promote the promotion, the litters Regiment plans from June 21 to June 30 ...

Total Pages: 8 1 .... 4 5 6 7 8 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.