Article on the subject of "hackers"
-
US $ 1.7 billion of electronic money was beaten by hackers in 2018
the cyber criminals 'working' in the e-money market must have had a successful 2018 pocket-sized electronic money worth $ 1.7 billion.
-
Hackers use banks as a starting point for phishing attacks
the cybercrime attacks banks and financial institutions entering and using a compromised infrastructure to have access to specific goals in every region or country that is trending. increase.
-
Hacker purged two-factor security just by automated phishing attacks
surely many people still believe that protecting online accounts with two-factor authentication can be an effective way to fight hackers, but after the incident, we may need to think think!
-
The whole city had to return to the 'stone' era using typewriters because the entire computer system was hacked
computer systems in mat su, a small city and the town of valdez in alaska, usa were attacked and 'kidnapped' caused the entire computer system, phone, server, e-mail server at this area is numb.
-
It turns out this is how hackers attack your computer through the main screen
the video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
-
Discovered a group of hackers who use secret code to spy on 21 countries
a group of secret hackers specialized in using android malicious code and other sophisticated reconnaissance tools to steal messages, call history, documents of the press, military, corporation and many other targets at 21 newly discovered country in beirut.
-
There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computers
the fingerprint manager pro program of microsoft windows 7, 8 and 8.1 allows users to store data, log in personal accounts on websites, log in to a lenovo computer via fingerprint there are many vulnerabilities that may allow hackers to access user sensitive data.
-
Hacker was jailed for 2 years for DDoS attacks against Skype and Google
a 21-year-old was jailed for two years after being accused of conducting ddos attacks on high-tech companies such as skype and google.
-
Former NSA hacker turned Kaspersky antivirus software into a spy tool
by knocking out kaspersky lab's anti-virus software and turning it into a search engine that benefits from confidential documents, patrick wardle, digita secutiry's research director and former nsa hacker proved that, sometimes when a security software can still be exploited and become an effective
-
The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
while intel's meltdown and specter vulnerabilities have not been completely overcome, the world faces a new security vulnerability that allows hackers to take complete control of the user's device and attack time within 30 seconds.
-
Update Teamviewer now if you don't want to be hacked
teamviewer has released an emergency patch that allows hackers to take control of the computer when they are in the remote control session.
-
Hackers use simple tricks to steal Ethereum worth 7 million dollars in 3 minutes
it only takes 3 minutes and 'a simple trick' is that this hacker stole 7 million ethereum, news that shook the virtual money market.
-
The hacker group threatened to spread the network attack tool behind WannaCry
the tool used by the hacker group to create the wannacry global cyber attack is about to be released.
-
Watch out for new dangerous viruses similar to WannaCry
another type of computer virus that exploits a security hole in the windows operating system, such as the wannacry malicious code, has spread more than 200,000 devices and helped hackers hack silver.
-
The new threat in Linux operating system can have 'incalculable' consequences.
a new virus that appears to attack a linux system, called linux / shishiga, could become a major security threat.
-
Classify hackers and career opportunities for true hackers
must white hat hackers, black hat hackers, gray-hat hackers have to be all kinds of hackers in the world? let's find out the hacker classification in this article.
-
Do you know who white hat hackers are and how their lives are?
what do you understand about hackers? on the battlefield now aside from the black hat hacker there are white hat hackers silently protecting people. so what's the life of white hat hackers?
-
[Infographic] Things to know about a hacker
have you ever considered a hacker to be a career? the infographic below will help you know if becoming a hacker is right for you.
-
The way Hacker uses to remain anonymous
hackers use different ways to remain anonymous while hacking, but it must be said that anonymity is completely unthinkable, but hackers can be safe and anonymous to some degree and ensure backwardness. it is very difficult.
-
World hackers in China
the wall street journal has revealed some of the chinese hackers' underground world - the focus of hackers in the world today ...
-
It's time to change the definition of hackers
most dictionaries define 'hackers' with evil connotations. but now it's time to change this.
-
The leading site to learn hacking skills
when it comes to hackers, perhaps the first model we imagine is college students or experts in computer science.
-
Top 10 brilliant hackers
here are 10 hackers who attacked and caused the most serious consequences ever known in the history of the internet.
-
The most basic insights to becoming a Hacker - Part 1
many of you newbie have asked me 'what is a hack? how to hack? ' but you have forgotten that you need to have a general knowledge, understand the terms that people who are familiar with the web or use.
-
Warning: Hackers can access smart speakers
now, as the trend of smart home grows, this also becomes the ideal target for hackers to exploit vulnerabilities in smart devices from refrigerators and televisions to smart speakers to perform behavior. unrighteous.
-
Review the 'bad exploits' of bad Vietnamese hackers
from the very beginning, vietnamese black hat hackers have shown their 'bravery' in the break-ins, taking account of bee ... and reviewing some of the 'achievements' of vietnamese hackers in 10 years. come here.
-
White-hat hackers, from their passion to the job to earn money, and little-known things
white hat hackers - heroes who don't cloak!
-
Microsoft has a group of 'elite' hackers that specialize in attacking Windows to keep the operating system safe
their mission is to attack to find security holes on windows, report to microsoft to research and release patches before the crook takes advantage of them for bad purposes.
-
Virus tracking software 'draw lines' for hackers
programs that monitor and record unusual phenomena on the internet because security companies set up secrets are being discovered by hackers and take advantage of their attacks.
-
Hackers attack the casino through a hole in the smart thermometer of the aquarium
hackers have found a flaw through a smart thermometer that is used to monitor water in aquariums in the middle of the hall to penetrate the system and get information from the casino.
-
Toyota Vietnam confirmed being attacked by hackers
yesterday (february 29, 2019), toyota vietnam company issued a notice on its website toyotavn.com.vn confirming that the company's computer system was attacked by hackers and may have been accessed. unauthorized access to some customer data.
-
5 ways hackers 'beat' fingerprint scanner
fingerprint scanners are a good defense against hackers, but that doesn't mean they can't be broken.
-
Test your understanding of P2 hack
the network administrator's quiz below will help you gain the knowledge to start your career as a hacker. the question set has only 2 answers, you just need to answer right or wrong.
-
More than 1 million computers are infected by hackers
hackers design fake websites to scare internet users to download and install fake antivirus software.
-
Air New Zealand hacked, customer information is at risk of falling into the hands of hackers
air new zealand - one of new zealand's largest airlines, has been visited by hackers