Skip to main content

Home/ Discovery Educator Network/ Group items tagged hacker

Rss Feed Group items tagged

luthfi waloetz

Hacker Terbaik di Dunia Waloetz Go Blogg! - 0 views

  •  
    Hacker Terbaik di Dunia - Hacker adalah orang yang mempelajari, menganalisa, dan selanjutnya bila menginginkan, bisa membuat, memodifikasi, atau bahkan mengeksploitasi sistem yang terdapat di sebuah perangkat seperti perangkat lunak komputer dan perangkat keras komputer seperti program komputer, administrasi dan hal-hal lainnya , terutama keamanan.
Alex Parker

Hackers jump on Apple Watch to phish for data - 1 views

  •  
    Hype surrounding smartwatch exploited by cynical scammers. Hackers have jumped on the unveiling of the Apple Watch as a chance to phish for data through social networks, according to the security vendor Malwarebytes.
Alex Parker

5 hacker myths you really should stop believing - 1 views

  •  
    by | 04 February 2015 Due out in a few weeks, Blackhat is a new movie looking at a case of high-level computer hacking - but how accurate is it? Lookout, your friendly neighbourhood hacker-for-good, has taken a closer look, and at first glance it's good news with the film steering clear of tired old tropes.
Alex Parker

Data breaches - hackers have nothing on your own employees - 1 views

  •  
    Norman Shaw, Founder and CEO of ExactTrak, on human error as the main cause of data breaches and to protect against it.
Jennifer Dorman

Online Privacy & Security Software | Cocoon - 5 views

  •  
    Cocoon is an all-in-one plugin that makes everything you do online secure, virus-free and private. Without Cocoon websites and hackers have access to your computer to leave cookies or infect it with viruses and malware. You even get protection on open Wi-Fi access points.
Alex Parker

Mobile apps leaking data through ad networks - 1 views

  •  
    'Cross application' data sharing makes user vulnerable, says MWR InfoSecurity. Free mobile apps that use third-party advertising code are putting users in danger of being hacked, according to MWR InfoSecurity. The firm found that ad networks were inheriting the permissions of free apps, granting them access to the address books, text messages and emails of potential victims if the network was compromised by hackers.
Alex Parker

How cloud computing leaked private celebrity photos - 1 views

  •  
    Analysis: Was phishing or brute force responsible for the attack? Both businesses and consumers are increasingly reliant on services such as Apple's iCloud, which has been implicated in the celebrity picture attack. Companies are now using it to store intellectual property as well as information about its customers, and this makes it a prime target for hackers.
Alex Parker

5 security threats to wearable technology - 1 views

  •  
    The proliferation of wearable devices that connect to the Internet understandably has a great many people worried about the implications for security. Soon enough, hackers could have a direct line to anything from wristwatches to pacemakers, and the damage could be devastating. Here are the top five wearable threats which could have an impact on you.
vishwanath123

67 percent of the high number of security breaches reported than five years back. - 0 views

  •  
    Like always, even the last year wasn't any bad for hackers! They were busy targeting and attacking major cities, state and local governments, businesses, hospitals, and schools around the globe. They used all forms of cyberattacks, including ransomware, BEC, phishing, and many others, to get hold of their malicious intent.
1 - 10 of 10
Showing 20 items per page