News Security Page 131

Security

Linux Mint Website Hacked, Users Duped to Download ISO's with Backdoors

Linux Mint Website Hacked, Users Duped to Download ISO’s with Backdoors

In an unexpected turn of events which sent Linux into a jizzy, the head of the Linux Mint project Clement Lefebvre said that the Linux Mint website had been compromised and that the hackers...
New Android Trojan Steals Your Banking Details and Encrypt Devices for Ransom

New Android Trojan Steals Your Banking Details and Encrypts Files for Ransom

Android OS has been the favorite destination of hackers to introduce their viruses in various ways. They new Trojan has surfaced on Android which has the ability to steal your all bank details and hold your...
Top 10 Skills Required to Become a Pro-Hacker

Top 10 Skills Required to Become a Pro-Hacker

The term hacker literally means a person who uses computers in order to get unauthorized access to data. Hacking is not crime unless and until you do it to get unauthorized access. In this...
US Says Apple Can Retain Possession of the Hacking Software

US Says Apple Can Retain Possession of the Hacking Software

The controversy surrounding the iPhone of one the San Bernardino attackers continues to grow as U.S government has made it clear that the administration would allow Apple Inc. to retain possession of the software...
Top 10 Best Hackers Of All Time

Top 10 Best Hackers Of All Time

In this list you will find some well known personalities who were hackers. They either hacked into computer or telephone systems and some created computer viruses. Some of them were also sentenced to jail and then released....
FBI Arrests Anonymous Hacker Accused in Hospital Computer Hacking Case

FBI Arrests Anonymous Hacker Accused of Hacking Hospital’s Computer

Federal Bureau of Investigation (FBI) have claimed that they have arrested a man accused of hacking computers in Children's Hospital. The arrested man had escaped from the country and was later detained by the...
Eight Year Old Vulnerability Uncovers Devices to Attack, thousands apps

Eight Year Old Vulnerability Uncovers Devices to Attack, thousands apps

Researchers have found a vulnerability in the GNU C Library, GLIBC which makes Unix Based systems like Linux Servers prone to security attacks. Eight Year Old Vulnerability Uncovers Devices to Attack, thousands apps It has been...
Hackers have held California Hospital's Network Hostage for $3.6 Million

Hackers have held California Hospital’s Network Hostage for $3.6 Million

At Los Angels the computers were completely down for a week after some malicious software ended up its internal network. Patients were transferred to other hospitals because of the outage. Hackers have held California Hospital's...
Android Devices Hit By Virus That Can Erase Everything

Android Devices Hit By Virus That Can Erase Everything

Android Devices constitute about 75% of the total smartphones worldwide. However, it has been hit by many viruses and some viruses are breaching the data by various means. Android Devices Hit By Virus That Can...
Indian Websites More Vulnerable To Attacks by Pakistani Hackers

Indian Websites More Vulnerable To Attacks by Pakistani Hackers

Indian and Pakistan have been rivals since decades. Besides this, hackers from both countries show their aggression in hacking government or individual websites. For example Indian Hackers deface Pakistani Websites while as Pakistani Hackers deface...

STAY CONNECTED

1,483,364FansLike
1,869FollowersFollow
21,241FollowersFollow
103,544FollowersFollow
2,533FollowersFollow
6,374SubscribersSubscribe

LATEST