PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

How to Find the Details of a Network Attack

mardi 12 mai 2015 à 10:10
Let’s be honest, a network attack of any scale is inevitable in today’s IT world. Do you have the ability to quickly identify the details of the attack? If your network goes down, your network monitoring tool can tell you what happened, but knowing details about who was vulnerable or why the attack happened is even more valuable. An often overlooked feature of log management software is

Why Tor Shuts Down its Anonymous Cloud Service?

lundi 11 mai 2015 à 10:53
Why Tor Cloud Project Shuts Down? Yes, you heard that right. The Tor project has announced that it’s closing down its Tor Cloud service that allowed users to donate bandwidth for browsing the web anonymously. The Tor Project is a non-profit organization behind the Tor anonymizing network that allows any online user to browse the Internet without the fear of being tracked. And one of its

Windows 10 is the Last Version of Windows, Microsoft Confirmed

samedi 9 mai 2015 à 13:11
Microsoft just announced in its Ignite 2015 conference in Chicago that Windows 10 is set to be "the last version of Windows." "Right now [we are] releasing Windows 10, and because Windows 10 is the last version of Windows, [we are] all still working on Windows 10," said Microsoft's developer evangelist Jerry Nixon while speaking at the conference this week. What exactly does it mean?

New GPU-based Linux Rootkit and Keylogger with Excellent Stealth and Computing Power

samedi 9 mai 2015 à 11:13
The world of hacking has become more organized and reliable over recent years and so the techniques of hackers. Nowadays, attackers use highly sophisticated tactics and often go to extraordinary lengths in order to mount an attack. And there is something new to the list: A team of developers has created not one, but two pieces of malware that run on an infected computer’s graphics

Nearly 95% of SAP Systems Vulnerable to Hackers

vendredi 8 mai 2015 à 19:36
More than 95 percent of enterprise SAP installations exposed to high-severity vulnerabilities that could allow attackers to hijack a company's business data and processes, new research claims entirely. According to a new assessment released by SAP (short for Systems, Applications & Products) solutions provider Onapsis, the majority of cyber attacks against SAP applications in the