Hackers

Read about hackers, The latest news, videos, and discussion topics about hackers from alibabacloud.com

Safe Play Wi-Fi network to facilitate the risk of not network

A beautiful summer day is a good time to go on a trip. In addition to novels and magazines, laptops, smartphones and other electronic products have become the leisure equipment everyone carry. Hotels, airports and other places in the ubiquitous Wi-Fi network, so that everyone can online entertainment anytime. With the development of science and technology, even some flight flights also provide Wi-Fi internet service, very advanced. Wi-Fi is a convenience for us, and at the same time it can be a weak spot for hackers to hack into users ' computers. Especially in the holiday, everyone's vigilance will be relaxed with the mood, so that outlaws while virtual ...

Microsoft investigates the release of earlier versions of Halo: Zhiyuan Star

In the near future, Microsoft has provided an early version of the Halo: Zhiyuan Star in a hidden part of the Xbox Live Marketplace, which is designed for industry testers to use. However, it was not long before it was leaked out on Xbox Live.  Despite being priced at $1200, hackers managed to circumvent the restrictions and download the game code. Microsoft attaches great importance to this, claiming that they are investigating the security breach on Xbox Live and will patch it as soon as possible. "Halo" series is not the first to be leaked early, "light ..."

Hackers write new driver Kinect action play "Street Fighter 4"

According to overseas media reports, a foreign hacker has written a new Kinect driver, players can feel the operation of the classic fighting game "Street Fighter 4." Author Demize2010 has written a faast script through the previously released Kinect open source program, which allows the Kinect to scan the player's body movements and respond to the character's actions via a script command. For example, when you wave, the character in the game punches, and when you kick, the characters in the game get out of the leg, and the classic "Wave Fist" and "Dragon punch" can be done by simulating moves ...

Tips: How to get the router out of security trouble

Many network administrators do not realize that their routers can be a hot spot for attacks, and that the router operating system is as vulnerable to hackers as the network operating system. Most SMEs do not hire router engineers or outsource this functionality as a necessity. As a result, network administrators and managers have neither the knowledge nor the time to secure the router. Here are 10 basic tips for ensuring router security. 1. Update your router operating system: Just like the network operating system, the router operating system also needs to be updated to correct programming errors, soft ...

Overseas hackers dissatisfied with Chinese shanzhai PS3 electronic dogs appeal to players to boycott

More Play network (compile/applies will) claimed to successfully cracked the PS3 host of the famous crack organization Psx-scene admitted that there are already Chinese manufacturers are trying to clone the use of external USB electronic dog PSJailbreak.  They remind the players on their website that they are ready to buy and beware of fake and shoddy Chinese shanzhai. "Beware of imitation goods from China." PSJailbreak by our original, only buy the original to obtain after-sale warranty and technical support. "Site screenshot: the top text to remind players to alert the Chinese cottage has a source of information, a ...

Hackers hijack "Gate of magic" player data threat service provider

January 18 Latest news, recently, a popular game "Gate of Magic" (Runes of Magic) players hacked the game's database, to the player's personal information as a threat to the German service provider of the game. Out of rage, player Augustus87 used his account to attack the game's Western server Frogster company.  Claiming to have obtained the account name and password of 3.5 million players, if the player does not meet his requirements, he will disclose all of the information to the public. Their requirements are many, but mainly for frogst ...

Hacker's personal information from the public to fake WiFi theft

Summary: Guangzhou has a number of public places have free WiFi (wireless network), many mobile phone users will be connected to the Internet without hesitation, think that the free up on the cheap, but may fall into the trap. Recently, there are hackers in Starbucks, McDonald's (micro-BO) These many public places in Guangzhou have free WiFi (wireless network), a lot of mobile phone users will be connected to the Internet without hesitation, that the free take advantage of the cheap, but may fall into the "trap." Recently, hackers have been exposed to Starbucks, McDonald's (micro-BO) These provide free WiFi public places, with a w ...

Search engine poisoning is a popular attack tactic for hackers

Absrtact: According to the trend technology TrendLabs from January to March, search engine poisoning (SEO) techniques remained the most prevalent attack tactic in the region in the first quarter of 2010. The Asia-Pacific region malware programs that infect computers are still based on the data collected by the trend technology TrendLabs from January to March, and search engine poisoning (SEO) techniques remained the most prevalent attack tactic in the region in the first quarter of 2010. The Asia-Pacific region malicious program infects the computer the way, still is downloading by the Internet, other malicious ...

CSDN website 6 million user password compromised

Online users have said that in 2011, December 21, hackers in the online public on the well-known programmers Web site CSDN user database, which has as much as 600多万个 the plaintext registered email account and password was exposed and leaked, thus becoming a major network security accident in China this year. And this is called "csdn-Chinese It community-6 million RAR" file on the Internet by the fiery spread of netizens, file size of 107366K, and after downloading verification, the author found that there is indeed a large number of CSDN mailbox and ...

Get to know the registry location that's easiest for hackers to exploit

Now people always encounter this situation, one day to open an attachment in their mail, because that mail address and a colleague's address is very similar, so did not consider the attachment to open the download. Do not want this attachment is a virus, it makes its own machine is slow, after the antivirus also does not have much effect. In fact, viruses, Trojans, and some malicious software, often to the windows of the registry, although the form of destruction is not the same, but after analyzing their destructive methods are not irregular to follow. Here is a list of some user systems that are susceptible to modification ...

25 ridiculous bad passwords-Please don't use these codes anymore, really.

class= "Post_content" itemprop= "Articlebody" > Your network account password has enough strength to prevent hackers? But now there are a lot of people because of the weak password and be appalling, but also inadvertently become a zombie network of members ... SplashData has just published a list of all kinds of weak-explosive but common passwords, so that everyone can "refer to". Sadly, the human race really did not grow, the list of passwords are no big difference from last year: ...

It has been criticized for not telling Microsoft the first time it has been disclosed.

July 10, Microsoft said recently that hackers attacked some computers by using a Windows vulnerability released by a Google researcher two months ago, Reuters reported. The researchers have been blamed for disclosing vulnerabilities without first informing Microsoft. Microsoft did not disclose the attack in detail. It said in a Tuesday announcement that hackers had launched "targeted cyber attacks". The term "targeted cyber attack" is often used by security experts to refer to an attack directed against an enterprise or government target for spying and sabotage. Google security Engineer Tavis &mid ...

Global users face major security risks: Hackers can run malicious code

Summary: Microsoft issued an unconventional warning in Saturday, and security company FireEye discovered a vulnerability called Zero day (0day in 0day attacks typically indicates a bug that has not been patched, and, correspondingly, the entire phrase represents an attack using the vulnerability), the company Microsoft issued an unconventional warning in Saturday, and security company FireEye discovered a vulnerability called "Zero Day" (0day in 0day attacks generally indicates that there are no patches, and, correspondingly, the entire phrase indicates the use of the ...

See how useful the black chain is.

Absrtact: Recently perhaps everybody notices, the black chain in our side starts to prevail, many stationmaster all starts to itch for, then the black chain in the end has no function, can achieve what kind of effect? First of all, we understand what is black chain, black chain is SEO black Hat method Recently perhaps we have noticed that the black chain in our side began to prevail, many of the webmaster are beginning to itch, then the black chain in the end have no effect, can achieve what kind of effect? First of all, we understand what is black chain, black chain is SEO black hat technique is quite common in a way, some so-called hackers through various websites ...

A ripple effect of user data exposure

Since hackers have published online CSDN web site users database downloads, including MOP, Renren, multiplayer, and other parts of the user database has been uploaded to the web for users to download. The domestic well-known hacker Goodwell said that the expected disclosure of the site database behavior will likely trigger its knock-on effect, resulting in more Web site data will be released by hackers. Before that, such databases were traded underground, and the hackers could gain from them. However, since many users ' username and password are almost identical in each website, and when there is a black ...

Online games involved in Money Vortex Korean NHN game employees to participate in gambling pits

According to South Korean media reports, August 19 Seoul Central Court sentenced to the former NHN company staff 1 years 6 months suspended three years of execution, the suspect helped illegal personnel to conduct online gambling funds transactions by police arrested. The suspect with NHN employee status advantage and illegal personnel collusion illegally occupy NHN game funds, access to nearly 100 million Korean currency illegal income.  Although poker [download] The problem of online games has also appeared, but like this one directly from the NHN company internal staff to participate in the violation of the law is the first time. August 4, South Korean police cracked North Korean hackers and the people in collusion with the use of its manufacturing ...

27C3 hackers will be released at the end of the PS3 firmware tool

Yesterday is to crack the world very important day, 27C3 hacker annual meeting in Berlin, become a lot of experts exchange results and experience stage.  The following brings the latest news on PS3 cracked, from the final release of this annual meeting, now PS3 security line has collapsed, now the three main host finally cracked. Here's a summary of today's conference: the first few minutes are used to understand the Wii and the 360 current security defense status. The group then continued to explain the security defense of PS3. First of all, the panel analyzed geohot earlier this year ...

12306 reward to find loopholes, one to 2000 yuan! It's not easy.

class= "Post_content" itemprop= "articlebody" > 12306 website User Information leaked recently caused a stir. Although this is a hacker hit the library attack, but also exposed 12306 of sites in front of hackers lack of defensive power problem ... It is commendable that 12306 of the problem did not take evasive attitude, not only the first time to make corresponding, with the public security organs to catch behind, but also released a reward order: 12306 nets ...

Popular talent show "good voice of China" officially aired in the second quarter

July 12, the popular talent show "good voice of China," the second quarter of the official broadcast, attracted the attention of many netizens. But at the same time, from July 12 to the present, a little more than a week time, rising "cloud security" system to intercept thousands of fake "good voice second season" phishing website. China information Security Report of the first half of 2013, the latest release of the state Information Center, in the first half of this year, hit the talent show has become the focus of hackers, all such programs "out of the lottery" site are phishing scams, users once credulous, can cause thousands of ...

Online password tool LastPass launch Detection Tool

Absrtact: Earlier this week, OpenSSL, a large security vulnerability called Heartbleed, revealed that the vulnerability could allow hackers to steal user data without traces of access to affected sites. Hackers can attack sites that use HTTPS (where this vulnerability exists), and each time the suit is read earlier this week, OpenSSL, a large security vulnerability called "Heartbleed", exposes hackers to steal user data without traces of access to affected sites. Hackers can use HTTPS for this vulnerability ...

Total Pages: 8 1 .... 3 4 5 6 7 8 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.