Hackers

Read about hackers, The latest news, videos, and discussion topics about hackers from alibabacloud.com

Fingerprint payment to attack, rely on not reliable!

Absrtact: For cock silk, the fingerprint unlock has not been understood, the fingerprint payment is what thing. After all, Apple's iphone 5S, which takes the lead on fingerprint unlocking, is not affordable for everyone. After Apple explored the fingerprint identification, its dead rival Samsung also in the GAL for cock silk, fingerprint unlock still don't understand, fingerprint payment is what thing. Bi ...

Qihoo 360 kills Intelligent routing field

Absrtact: The banner of safety, Qihoo 360 officially opened the internet's upstream intelligent route and the intelligent home market. May 6, Qihoo 360 announced its smart hardware new 360 security routing booking activities officially opened, the price of 99 yuan.   360 official elimination of "security" banner, Qihoo 360 officially opened the internet upstream access-intelligent routing and the resulting smart home market.   May 6, Qihoo 360 announced its smart hardware new 360 security routing booking activities officially opened, the price of 99 yuan. 360.

Is it possible to cause cyber chaos?

"Could it lead to chaos in cyberspace?"   "I clicked" send "after repeatedly modifying my own question. A moment later, a reply in the dialog box "is now in turmoil."   After that, it was a long silence.   Apparently, the top white hat across the net (a hacker who uses his technology in good faith) has ignored me--and there's so much to do in this sleepless night.   April 8, 2014, will be forever in the annals of the Internet. This day, the internet world has two events: first, Microsoft officially announced that the XP stop ...

Expert on a minute to kill Wi-Fi's method analysis of WPA encryption system

The following article is mainly about the security experts to kill Wi-Fi in a minute of the WPA encryption system, August 28 news, Japan's two security experts said they have developed a wireless router in a minute to break the WPA encryption system method. This attack provides hackers with the means to encrypt traffic between the computer and the routers that use WPA (Wi-Fi Protected Access) encryption systems. This attack was made by Toshihiro Ohigashi of Hiroshima University of Japan and Masakatu Mori of Kobe University.

Hackers attack Microsoft's website

Abstract: According to foreign media reports, following Apple, Facebook and the "New York Times" and other well-known sites were hacked, software giant Microsoft's website has been infected. Recently, Internet security vulnerabilities have appeared on well-known websites such as Apple, Facebook and Twitter, and the website of Microsoft, the software giant, has been infected, according to foreign media reports, following a hacking attack on well-known sites such as Apple, Facebook and the New York Times. Recently, Apple, Facebook and Twitt ...

Smart home can be a huge security risk

Absrtact: If, not as soon as possible to reverse the entire industrial chain to the safety of the knowledge, smart home and even the internet may be a huge hidden dangers. This is not alarmism thrillers listen.   April 4, 2014, I have an exchange with the Kang Xiaoning Vice president of technology, the following for the dialogue if, not as soon as possible to reverse the entire industrial chain to the safety of the knowledge, smart home and even the internet may be a huge hidden dangers.   This is not alarmism thrillers listen. April 4, 2014, I have an exchange with the Kang Xiaoning Vice president of technology, the following is a dialogue ...

Qihoo 360 officially drives the Internet upstream intelligent routing

Play the "Safety" banner, Qihoo 360 officially opened the internet's upstream entrance-intelligent routing and the resulting smart home market.   May 6, Qihoo 360 announced its smart hardware new 360 security routing booking activities officially opened, the price of 99 yuan. 360 of the official sources say that the 360 security-routed security system will be updated in real time to protect WiFi networks and routers. In addition, the 360 security routes also have the ability to prevent brute force and anti-RUB network. The problem that the router is hacked violently, as long as the device tries to pass ...

Seowhy official website again appeared security Alliance risk identification

Abstract: For seowhy believe that everyone will not be unfamiliar, the recent Seowhy official website again appeared security Alliance risk identification, this is not the first time, random online inquiries about seowhy information will see a lot of garbage content and illegal words, you can clearly see For Seowhy believe that everyone will not be unfamiliar, the recent Seowhy official website again appeared security Alliance risk identification, this is not the first time, random online inquiries about the seowhy information will see a lot of garbage content and the offending words, you can clearly see, this is not Ann ...

4 steps to implement passive attack identify enterprise security risk Lite

The following article mainly describes the implementation of passive attack 4 steps to identify the enterprise security risks of the actual operation process, as we all know, the scanner can be directly on the server or workstation based on the software agent. host-based software scanners occupy the computing power of the processor, but the vulnerabilities it scans to can be handled more flexibly. Network based scanners are Plug and Play hardware devices that require less maintenance costs than software agents. In the past few years, the focus of the loophole has changed. On the one hand, units to protect their networks and systems become ...

Even if it has sounded the alarm, but the hacker still let you bad

Absrtact: Sony has been black for one months, but it seems that with the "assassination of Kim Jong-un," The Christmas release, people seem to be able to gradually farewell to the shadow of hackers, began to prepare to celebrate this important Western festival. But it seems like there's always been some sort of thing. Sony has been hacked for one months, but it seems that with the "assassination of Kim Jong-un" in the Christmas release, people seem to be able to gradually farewell the hacker's shadow, began to prepare to celebrate this important Western festival. But there seems to be some spoilers. Beginning in Saturday, a twit named "Anoymous" ...

Email addresses for some users such as Twitter are stolen

Abstract: According to foreign media reports, a hacker attacked the customer support service Zendesk this week, stealing e-mail addresses from Twitter, Tumblr and Pinterest users. Zendesk said the hacker had not stolen the user's mailbox password, and the company had already reported to foreign media that a hacker attacked the customer support service Zendesk this week, stealing e-mail addresses from Twitter, Tumblr and Pinterest users. Zendesk ...

What's OpenSSL?

The days when XP announced a formal cessation of service were also the days when Openssl burst into big holes. All afternoon we are in a state of emergency, the spirit of tension, this vulnerability affects the 30–50% ratio of the use of HTTPS sites, including the regular visits: Alipay, micro-letter, Taobao, internet banking, social, portal and other well-known sites. As long as the site to visit HTTPS is likely to have the risk of sniffing data, around 5 o'clock in the afternoon Zoomeye completed this data scanning: National 443 ports: 1601250, 33 ...

German hacker remote computer peeping Girl

This newspaper synthesis news a German male http://www.aliyun.com/zixun/aggregation/673.html "> Hacker through the network transmission Trojan Horse program, remote control up to 150 female student's computer camera to carry on peeping."   After investigation, the police successfully arrested the criminal suspect. According to local media reports, the men involved in the Rhine area, his modus operandi is through the Internet forum to meet female victims, and then the Trojan Horse program with screen protection software attached to the mail, fake others identity ...

Don't wash your hands! The famous hacker Kevin Mitnick talk about cloud security

Kevin Mitnick, one of the leading hackers and now a security advisor, describes his online life as a big game. "I am like the king of the mountains," said Mitnick, "and everyone wants to pull me off the throne." "To this end, he found a knight--cloud computing provider Firehost. (Kevin Mitnick = Kevin Mitnick) The former famous hacker, Kevin Mitnick, is now "out of Hand", which is easy to understand. As an early name tripod ...

The FBI said the Sony incident "careless" hackers exposed the IP address

Absrtact: Recently, U.S. Federal Bureau of Investigation Director James Comey at the Fordham University Law School Network Forum, said the FBI has been very certain that the hackers attacked Sony. Looking back at the whole incident: After Sony was attacked by hackers, North Korea officially denied that recently U.S. Federal Bureau of Investigation Director James Comey at the Ford University Law School Network Forum, claiming that the FBI has been very certain that the hacker attacked Sony. Review the whole incident: After Sony was hacked, North Korea officially denied 、...

Within a certain range, global cyber warfare has been quietly launched.

Absrtact: Deeply concerned about the strong message that the United States and Britain have issued in the last two days to deal with the cyber war, the U.S. regards the highest level of cyber intrusion as an act of war; the British government has shifted the country's cyber policy from defensive to offensive. The German Spiegel week is deeply concerned about the strong message that the United States and Britain have issued in the last two days to plan to deal with the cyber war, which the US regards as the "act of War", and the British government from "defensive" to "attacking". Der Spiegel, Germany, April 24 ...

In a state of emergency, mentally tense

All afternoon we are in a state of emergency, the spirit of tension, this vulnerability affects the 30–50% ratio of the use of HTTPS sites, including the regular visits: Alipay, micro-letter, Taobao, internet banking, social, portal and other well-known sites. As long as the site access to HTTPS may be the risk of sniffing data, around 5 o'clock in the afternoon Zoomeye completed this data scanning: the National 443 ports: 1601250, 33,303 are affected by this OpenSSL vulnerability! Do not know the world, how much use ...

Vulnerability Impact 30–50% Web site with HTTPS

The days when XP announced a formal cessation of service were also the days when Openssl burst into big holes. All afternoon we are in a state of emergency, the spirit of tension, this vulnerability affects the 30–50% ratio of the use of HTTPS sites, including the regular visits: Alipay, micro-letter, Taobao, internet banking, social, portal and other well-known sites. As long as the site to visit HTTPS is likely to have the risk of sniffing data, around 5 o'clock in the afternoon Zoomeye completed this data scanning: National 443 ports: 1601250, 33 ...

If the verification code can be cracked, how do we prove ourselves?

Perhaps the headline is a bit alarmist. David J. Hill, a writer for Forbes magazine, published an article in the hope of exploring the security of verification code. Why don't we take a look at the captcha, Wikipedia: Commonly known as the authentication code, it is a public automatic procedure which distinguishes the user from the computer and the person.   In the CAPTCHA test, the computer that is the server automatically generates a problem for the user to answer. This problem is generated and judged by computers, but it must be human to answer. Because...

Just 11 minutes! British 7-Year-old girl through tutorial cracked WiFi hotspot

class= "Post_content" itemprop= "Articlebody" > According to the Daily Mail of London January 21, a 7-Year-old girl in the UK has successfully cracked a WiFi hotspot password after watching online video tutorials for less than 11 minutes ... The girl is named Betsi Davis (Betsy Davies) from Dulwich, south of London. The demo video She watched was released under the supervision of network security experts ...

Total Pages: 8 1 .... 4 5 6 7 8 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.