Hackers

Read about hackers, The latest news, videos, and discussion topics about hackers from alibabacloud.com

Ensure application safety through network penetration testing

A colleague who worked for a company recently told me about their testing process and how comprehensive the tests were, and they also conducted network penetration tests on the application systems to ensure their full security. I think it sounds like a waste of time and resources. Do you agree with me? Is it good to implement network penetration testing when ensuring application system security? If so, what would be the benefit? Having robust, fully tested applications in a vulnerable network does not make much sense because the network itself has an unknown vulnerability in its configuration or process. Although the current hackers are ...

Overseas hackers released XB body sensor cracked video compatible PC

Local network (Compilation/flower Sword Shadow) according to overseas media reports, the Kinect (Microsoft's latest body sense operating system) has been hacked, and the Kinect 3D camera cracked can be compatible with PC host. Recently, Adafruit, a distributor of electronic products, has offered a 2000-dollar reward for deciphering the Kinect program so that it can work on a PC platform. Just a few days later, a hacker group called the "Natural user interface Online research group" was able to decipher the success and publish the cracked video online, which is a picture of the truth. Before, the change group also ...

The most sensational invasion incident in the history of the game hackers apologize for leaks

(Compiling/Katy Fish) According to overseas media reports, the former German well-known hacker Axelgembe in an interview, for the first time in its 2003 "invasion of Valve and leaked" Half Life 2 source code "to the developers to apologize. "I'm sorry for what I did," Axelgembe said, "I never meant to hurt valve, and if time could turn back, I would never make the same mistake again." This is still my memory of the nightmare, I do not intend to do so, but in the end I make things beyond recognition. Valve is ...

Trend Cloud Security intercept IE 7.0 Zero vulnerability attack Web page

December 9, Microsoft regularly released patches, but the next day the latest IE7.0 0 jet lag attack, this weakness has not yet been patched. Hackers exploit this vulnerability to embed harmful JavaScript and to attack Web surfers through Microsoft Internet Explorer7.0 Web browsers sdhtml weaknesses in processing XML. Users may be hacked for using IE7.0 even if they update the last patch released in Tuesday. Trend Technology Cloud security technology, the use of millisecond-level computing speed ...

What is the source of the attack from China?

Absrtact: A few days ago, a U.S. network security company issued a report that the Chinese military-related hackers repeatedly attacked the U.S. Web site, this statement immediately sparked international public opinion's strong concern. Does the Chinese army support hacking? How to view American companies and media recently, a U.S. network security company issued a report that the Chinese military-related hackers repeatedly attacked the U.S. website, this statement immediately aroused international public opinion's strong concern. Does the Chinese military support involvement in hacking? How do you think about American companies and the media? This reporter interviewed the relevant departments and experts. Chinese military participation ...

Teach you how to make your site more difficult to invade

Absrtact: 360 The newly released "2013 Chinese university website Safety Test Report" said that each of China's university websites were hacked 113 times a day (including scanning and other acts), of which the maximum number of attacks on the site up to tens of thousands of times. It is understood that the report data 360 the latest release of the "2013 Chinese University web site Safety Test report," said that each of China's colleges and universities on average every day by hackers attack 113 times (including scanning and other acts), of which the maximum number of attacks on the site up to tens of thousands of times daily. It is understood that the report data samples from January 1, 2013 to ...

The hacker completely captured PSN exposure Sony peeping user information

Some time ago, hackers cracked PS3 let Sony headaches unceasingly, Sony for PS3 pirated users began large-scale ban machine. However, there has been more headaches for Sony, it is rumored that a foreign great God has mastered the way to capture the PSN, if the fall of PSN, players can pay for free games, DLC and other downloads to their own PS3 or PSP300.  But the hacker who captured PSN said it would not publish in any form because it was seriously illegal. Recently, a well-known crack hacker claimed that he had thoroughly mastered the way to capture PSN. Knowing this behavior ...

Analysis and suggestion on safety threat of intelligent vehicle

360 Network security and Defense Laboratory senior security consultant Liu Jianhao said in the statement, is expected in 2017, 60% of the new car will be connected to the network, if hackers use the system of smart cars to remotely control the car, then the consequences will be disastrous. In Liu Jianhao's view, the automobile safety risk mainly has 3 kinds: the first kind, the contact type.   Direct contact with the car, in the car to carry out the transformation or some damage, and then cause the car safety problems. Type II, Non-contact. No need to touch the car can be used wirelessly, or the internet of things to reverse control ...

For all kinds of borrowing, Mac Thunderbolt interface can also be implanted into the virus

Summary: Borrow a removable hard drive? Borrow an external video card? Borrow the monitor? Later hackers may eliminate these problems for you. Computer Congress, a security researcher from Hamburg Chaos, Germany, successfully rewrote the computer's firmware through the MAC's Thunderbolt interface and planted it to borrow a removable hard drive? Borrow an external video card? Borrow the monitor? Later hackers may eliminate these problems for you. Security researcher from the German Hamburg Chaos Computer Congress success ...

Sony wants to cry no tears Nokia phones can also be used to crack PS3

Play video More (Compile/Lin Jie) Although Sony has made a court ban on PS3 jailbreak, it has not stopped hackers from acting, and recently released news that Nokia phones can also be used to crack PS3. In XboX360 and Wii piracy flying, PS3 has been adhering to the body of the King Kong is not bad, unfortunately, the final piece of virgin land in the end of the final or was brutally exploited by hackers. First PS3 jailbreak successfully cracked, although Sony won the lawsuit, but with the source code open, means more people can take this Dongfeng ...

Hackers blackmail Nintendo for stealing information from players

The BBC reported that Spanish police had captured a cyber hacker who claimed to have stolen thousands of Nintendo player account information and was deliberately blackmailing Nintendo.  According to the Spanish Ministry of the Interior, the suspect has stolen 4,000 information from the Nintendo players and threatened the Japanese game maker to report the information to the data Protection unit to sue Nintendo's negligence of information protection, and it is unclear what he has asked Nintendo. Without a reply from Nintendo, the suspect began leaking part of the information, but he planned to expose all the information to each other.

Top-level domain names and server failures in some parts of the country

January 21 Afternoon news, the country today in some areas of the top-level domain name and server failures, Baidu a strange two-level page (n.baidu.com), again triggered a lot of netizens attention.   Visit this page does not involve any Baidu business, but like "egg" generally only a short English phrase, suspected hackers breached.   3 o'clock in the afternoon today, the root of all common top-level domains in the country is abnormal, causing some domestic users to be unable to access the. com Domain name Web site, which has a systemic impact on the national Internet links. In the process, Baidu ...

WikiLeaks makes Assange one of the most controversial and concerned people

Last year's WikiLeaks incident made Mr. Assange one of the most controversial and focused figures in internet history, and in the recently introduced Chinese version of the Wiki war prequel Ⅰ, Assange himself provided the legendary story of the first generation of hackers at the end of the century, and for Mr. Assange, who is writing his autobiography,   The book is currently the only person he personally participates in providing insider biography. The inside Story of "half autobiography" Recently, the World Book publishing company launched the Chinese version of the "Wiki war Ⅰ: Assange and his fellow hackers," the book English name meaning "underground" (underground ...).

Do SEO can try black hat, but do not make hackers

Absrtact: When it comes to Black hat seo, a lot of people will associate the bad side. In fact, black hat SEO is not the production of garbage, but not hacker SEO, but white hat seo basis for white hat SEO test minefield, for the formal SEO pioneers. Good Black Hat seo is definitely honestar when it comes to Black hat seo, many people will associate the bad side. In fact, black hat SEO is not the manufacture of garbage, but not hacker SEO, but white hat seo basis for white hat SEO test minefield, for the regular SEO "pioneer." Good Black Hat seo is definitely honestar ...

Rising cloud security: China encounter hanging Horse Shuangse Search prize page bind virus

"51cto.com Comprehensive News" according to the Rising "cloud security" system monitoring, September 2, "China", "China's Network 10 anniversary Celebration", "the ultimate Net" and other lottery, E-commerce and classified information categories of websites were hackers hanging horses. Lottery players in the landing China query Shuangse lottery information will be linked to the horse site attack and thus infected with the virus. In the intercepted horse site, rising company found a worm (WORM.WIN32.VB.XG), the virus will modify the Start menu and IE home page, and download a large number of Trojan virus and malicious software, it is very difficult to clean up. Rising ...

Sony first! PS3 electronic dog permanently banned in Australia

Multi-Play Network (compiler/applies will) Sony for the PS3 host was cracked and the first legal action taken won a full victory.  Australia's Local court has ruled that PSJailbreak will be permanently barred from selling in the country. This is Sony's first major legal victory over hackers.  Previously, local courts in Australia had asked local dealers not to introduce and sell PSJailbreak, but the ban was valid for only a short week. In the final decision issued on 3rd, Australia's several well-known dealers include Ozmodchips 、...

315 exposure to public WiFi security issues, rising teach you to do a good job of protection measures

March 15 Night, CCTV 315 party exposed to free wifi in public places security risks, and the scene for the audience demonstrated the use of free WiFi interception of the audience transmitted photos and email password. Rising security experts pointed out that WiFi security problems in public places for a long time, this type of WiFi security is poor, hackers can easily "take", and through network monitoring, password attacks, session hijacking, script injection and backdoor implantation and other means of attack. At that time, not only can steal access to the WiFi user's photos and email password, while, micro-bo, micro-letter, Taobao, and even the net ...

Project Zero after the competitor offended the light

Abstract: Before and after the Spring Festival, Google Project Zero Security Star Team regardless of the Microsoft and Apple repair process, the two platforms are determined to expose the loopholes in the practice, in the security circle set off a big wave. And now, Google has given its own Chrome to find loopholes in the Pwnium hackers before and after the Spring Festival, Google Project Zero Security Star Team regardless of Microsoft and Apple repair process, determined to expose both platform loophole, in the security circle set off a big wave. And now, Goog ...

Codenomicon found a serious flaw in the world's largest open-source cryptographic service OpenSSL

Earlier this month, a security company called Codenomicon found a serious loophole in the world's largest open-source cryptographic service, OpenSSL, which hackers exploited to steal the keys that Web sites use to encrypt online transactions and web connections, could have as many as hundreds of thousands of affected servers, caused serious panic in the circle. Fortunately, Codenomicon also released patches while releasing the vulnerability message. But better to prevent than to mend. Recently, including Google, Microsoft, Facebook ...

Hackers directly on the target site with a specific link code made black chain

Abstract: Black chain is a very common method of SEO methods, generally speaking, it refers to some people with abnormal means to obtain the reverse links of other websites, the most common black chain is through a variety of web site procedures to get the search engine weight or PR higher black chain is a very common method of SEO methods, generally speaking , it refers to some people with abnormal means to obtain the reverse links of other sites, the most common black chain is through a variety of web site procedures to get the search engine weight or PR higher site Webshell, and then in the black site linked to their own ...

Total Pages: 8 1 2 3 4 5 6 .... 8 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.