- Hackers antivirus application preinstalled on Xiaomi phones into malware

what's more tragic when the tools that are considered shields for your device can now turn into malware that paves the way for unauthorized infringement, through the 'variable hand? virtual 'hackers'.
- In turn, Microsoft admitted being hacked because of the SolarWinds vulnerability

microsoft has admitted that they were attacked by hackers through a vulnerability of solarwinds' software update system. however, the software giant denied that hackers used their software to infect users as well as customers.
- Hackers attack gas stations, stealing more than 2300 liters of gasoline in the US

two suspects attacked a gas station in detroit, usa in the middle of the day and stole nearly 2,300 liters of gasoline worth about $ 1800. the incident lasted 90 minutes, gas station staff knew but could not interfere.
- Review the 'bad exploits' of bad Vietnamese hackers

from the very beginning, vietnamese black hat hackers have shown their 'bravery' in the break-ins, taking account of bee ... and reviewing some of the 'achievements' of vietnamese hackers in 10 years. come here.
- Detecting APT attack campaign on important national infrastructure on Tet holiday

the main purpose of hackers is to gain user control, then through it to attack internal computer systems to steal important information.
- What is 51% attack? How does 51% attack work?

the 51% attack refers to a potential attack on the integrity of the blockchain system, in which a single malicious actor or organization tries to control more than half of the network's total hash power, .
- What is a Deface attack? How to prevent Deface attacks

deface attacks are attacks that change the visual appearance of a website. this is often the action of hackers who specialize in hacking systems. they break into a web server and replace the hosted website with their own website.
- Classify hackers and career opportunities for true hackers

must white hat hackers, black hat hackers, gray-hat hackers have to be all kinds of hackers in the world? let's find out the hacker classification in this article.
- Can your data be stolen when using public Wifi?

in technology terms, man-in-the-middle (mitm) is an attack that is intercepted by a third party (hackers) during communication between the server and the user. instead of the data being shared directly between the server and the user, the links will be broken by another factor. then hackers will change the content or add some malware to send to you.
- Warning: Hackers can access smart speakers

now, as the trend of smart home grows, this also becomes the ideal target for hackers to exploit vulnerabilities in smart devices from refrigerators and televisions to smart speakers to perform behavior. unrighteous.