Hacker

Read about hacker, The latest news, videos, and discussion topics about hacker from alibabacloud.com

The domestic burst of Android WebView security vulnerabilities will lead to a large number of applications as a hacker pipeline

Absrtact: Innovation Factory's Internet fast Bird to 36 Krypton revealed that the recent domestic burst of Android WebView security vulnerabilities will lead to a large number of applications as a hacker pipeline. The vulnerability endangers more than 90% of Android handsets, and when users open a horse's web page via a leaky app, they can be revealed to 36 Krypton by the Internet fast Bird, a recent domestic burst of Android WebView, which could lead to a large number of applications being hacked. The vulnerability threatens more than 90% of Android phones when users are hit by a loophole in the app ...

2014SyScan360 international forward-looking information security and safety conference opened

Netease Technology News July 16, sponsored by SyScan, http: //www.aliyun.com/zixun/aggregation/237.html "360 company hosted the 2014SyScan360 international perspective information security and safety conference opened today in Beijing in this Security conference, a Tesla crack challenge competition announced the launch.It is reported that this Tesla Challenge, the use of hacker Challenge way to test the safety of Tesla automotive systems. Tesla had previously accepted ...

Anti-American hacker group attacks U.S. Web server again

Whether it is consumer-level users, business users or government departments are very concerned about the security of online data. The theft of data cannot be measured in terms of money, which in some cases may even endanger national security. In order to protect the data, people have spent a lot of money to protect the data from being stolen by vicious attackers. Still, according to InformationWeek, anti-American hackers have again successfully breached two of US military-sensitive sites in recent days. The two sites are related to the Macalester Arms Factory and the U.S. Army Corps of Engineers. Which ...

Sony and Hotz out-of-court settlement analyst says it will deter other hackers

According to overseas media reports, Sony and PS3 cracked hacker George Hotz recently issued a joint statement declaring that "the lawsuit against Hotz by Sony Computer Entertainment US branch in SAN FRANCISCO, Calif., has been settled out of court." The two sides reached a consensus on March 31, 2011. As part of the settlement agreement, Hotz agreed to be imposed a permanent ban.  "Although Hotz declined to discuss the specifics of the agreement on his blog, calling it" confidential ", the full text of the agreement has recently been disclosed by the website VG247. Hotz is permanently barred from any ...

The most sensational invasion incident in the history of the game hackers apologize for leaks

(Compiling/Katy Fish) According to overseas media reports, the former German well-known hacker Axelgembe in an interview, for the first time in its 2003 "invasion of Valve and leaked" Half Life 2 source code "to the developers to apologize. "I'm sorry for what I did," Axelgembe said, "I never meant to hurt valve, and if time could turn back, I would never make the same mistake again." This is still my memory of the nightmare, I do not intend to do so, but in the end I make things beyond recognition. Valve is ...

Hackers attacked customer support service Zendesk this week.

Abstract: According to foreign media reports, a hacker attacked the customer support service Zendesk this week, stealing e-mail addresses from Twitter, Tumblr and Pinterest users. Zendesk said the hacker had not stolen the user's mailbox password, and the company had already reported to foreign media that a hacker attacked the customer support service Zendesk this week, stealing e-mail addresses from Twitter, Tumblr and Pinterest users. Zendesk ...

Qihoo 360 issued risk warning yesterday

Abstract: Qihoo 360 issued a risk warning yesterday, recently, micro-letter, such as a variety of popular applications exposed high-risk horse vulnerability: As long as you click on Friends or friends in the circle of a Web site, the mobile phone will automatically execute the hacker instructions, appear to be installed malicious deduction software, to the Curious Tiger 360 issued risk warning yesterday, recently, Micro-letter, such as a variety of Android popular application exposed high-risk "hang the horse loophole": As long as the friend news or friends in the circle of a Web site, the mobile phone will automatically execute the hacker instructions, appear ...

Facebook applies poke and camera apps to Snapchat apps camera

Absrtact: Today, Facebook officially put its own class Snapchat application poke from the App Store, with a photo app and Facebook Camera. Poke is a class Snapchat app that Facebook launched at the end of 2012. Poke is a focus of Facebook hacker culture today, Facebook officially put its own class Snapchat application Poke from the App store to the shelves, along with the photo application Faceboo ...

The difference between good programmers

&http://www.aliyun.com/zixun/aggregation/37954.html">nbsp; "When you're 50 years old, are you still ready to program?" This topic is hacker news, but we can see that the truly successful programmers, such as John Carmack, Peter Norvig, Jeff Dean, even if they are not young, but still passionate about programming, what they have with the public ...

A fair duel with Sony PS3 crack hackers seek financial support

(compiler/ananas) George Hotz is the hacker, he wrote the battle with Sony in his blog. If Hotz no nonsense, he is now confronting Sony.  As is known to all, the cost of fighting Sony is huge. Sony is a financially powerful multinational, and George Hotz is just an ordinary person, a man who has cracked the iphone and is now PS3 to crack it. Sony was taken to court for PS3 's break. So the young hacker is seeking sponsorship ...

The original half of the USB is unsafe

At the August Black Hat security conference, Nohl demonstrated the BADUSB attack, the principle of using USB control chip firmware can be reset this vulnerability to attack. This means that a USB controller can be infected with malware, virus files, and can send commands, steal files, or install malware by simulating a USB hard drive. At the pacsec security conference in Tokyo, computer hacker Karsten Nohl unveiled the latest developments in its BADUSB study. They simulated attacks on the USB controllers of the eight major vendors to see if the silicon chips could withstand ...

Education Gate attracts hackers

A few days ago, the Ark of the son through micro-bleomycin shelling "wage Emperor" tang June's personal education is false, has aroused widespread concern in the community. However, peat, but peat.   Yesterday, and a netizen exposure said, Tang June as president and CEO of Xinhua All (002264, shares bar) group official website, suspected to be hackers attacked. Reporters from the 360 Security Center verified that the black chain does exist, and the Xinhua website has at least two waves of hacker attacks. In addition, two consecutive books are written by Tang June, "Western Pacific (601099, shares) university Ph. D."

You can't afford to hurt an accident. Cut off the national internet

A 75-year-old grandmother cut off the internet in almost all of Armenia's country in Thursday in search of scrap metal. The old man was collecting scrap metal, after continuous excavation found a cable, because there is no domestic obvious "cable does not contain copper" hint, the older hacker with a shovel cut cable, which led to 100% of Armenia's network, Georgia and Azerbaijan more than 90% of the network paralysis, It took the technician 5 hours to fix it.  The old man has now been arrested and awaiting treatment. The old lady of the copper wire is in the white day of the net center ...

A Twitter account named "Anoymous" released a leaked file

Absrtact: Sony has been black for one months, but it seems that with the "assassination of Kim Jong-un," The Christmas release, people seem to be able to gradually farewell to the shadow of hackers, began to prepare to celebrate this important Western festival. But it seems like there's always been some sort of thing. Sony has been hacked for one months, but it seems that with the "assassination of Kim Jong-un" in the Christmas release, people seem to be able to gradually farewell the hacker's shadow, began to prepare to celebrate this important Western festival. But there seems to be some spoilers. In the beginning of the Saturday, a name "Anoymous" ...

Impression note Application Evernote recently attacked by hackers

Abstract: According to foreign media reports, for mobile devices and computers, the impression of notebook application Evernote has recently been attacked by hackers, this attack will cause Evernote forced to require all users to update the password. Evernote through the blog, said the hacker did not get the user any according to foreign media reports, for mobile devices and computer impression note application Evernote recently was attacked by hackers, this attack will cause Evernote forced to ask all users to update the password. Evernote through the blog, said the black ...

China keen team aboard New York Times Square big screen

[body] local time March 23, China Super-class Security research team Keen, boarded New York Times Square big screen.    Among them, "the World Top Information security tournament five Crown king" words, particularly eye-catching. At just the end of the world's top hacker competition Pwn2Own 2015, Keen team by continuously breaking IE browser plugin flash and IE browser PDF reader, get two ...

The internet may be fragile

A hacker told Congress he could paralyze the entire Internet in half an hour. The hacker named Peiter Zatko, a member of the "hacker think-tank" L0pht, is now working on a new job for the Pentagon's senior research programme. Zatko says many of the internet's vulnerabilities are still valid today.   But he still needs a few hours to get the internet all paralyzed, partly because of the growing number of Internet carriers (carriers). Whether you are e-mailing or browsing the web. You read and transmit the letter ...

Hackers blackmail Nintendo for stealing information from players

The BBC reported that Spanish police had captured a cyber hacker who claimed to have stolen thousands of Nintendo player account information and was deliberately blackmailing Nintendo.  According to the Spanish Ministry of the Interior, the suspect has stolen 4,000 information from the Nintendo players and threatened the Japanese game maker to report the information to the data Protection unit to sue Nintendo's negligence of information protection, and it is unclear what he has asked Nintendo. Without a reply from Nintendo, the suspect began leaking part of the information, but he planned to expose all the information to each other.

Do SEO can try black hat, but do not make hackers

Absrtact: When it comes to Black hat seo, a lot of people will associate the bad side. In fact, black hat SEO is not the production of garbage, but not hacker SEO, but white hat seo basis for white hat SEO test minefield, for the formal SEO pioneers. Good Black Hat seo is definitely honestar when it comes to Black hat seo, many people will associate the bad side. In fact, black hat SEO is not the manufacture of garbage, but not hacker SEO, but white hat seo basis for white hat SEO test minefield, for the regular SEO "pioneer." Good Black Hat seo is definitely honestar ...

Sony PSN Recovery Slow, some users can access

Sony PlayStation Receptacle has had a fourth consecutive day of connectivity since the hacking attack, but the company said in Sunday that the service was slowly recovering. Lizard Geek hacker Group has issued a statement responsible for PlayStation receptacle and Microsoft Xbox Live on Christmas Day downtime. Xbox Live was restored in Friday. "We are going through a wide range of network issues that are currently being addressed." "Sony in PlayStation ...

Total Pages: 7 1 2 3 4 5 6 7 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.