Chinese and US officials have discussed hacking concerns at the inaugural meeting of a joint US-China working group on cyber security.
Browsing: Hacking
Nine of the world’s biggest weapon makers and telecoms providers are teaming up with Britain to bolster the country’s cyber security, aiming to tackle the increasing threat of hacking and other such attacks.
Hackers bombarded Nintendo for a month with 15.46 million bogus login attempts, out of which 23,926 struck the jackpot, exposing names, addresses, phone numbers and other personal details of corresponding Club Nintendo customers.
A vulnerability that could affect 99 percent of the world’s Android-powered phones and tablets has been unearthed within the Google-owned platform.
Australia’s banks have been quietly working with a Russian security and forensics firm to swat a nasty banking trojan crafted in the Ukraine that has infected 150,000 Australian PCs since last year.
May 14th 2013, we launched a poll titled: “Vote for your favorite Linux Penetration Testing Distribution” (you can still vote!) and – year to date – June 28th 2013, the poll has received over 200 votes!
Treasury Secretary Jack Lew raised concerns on cyber security during his meeting with Chinese President Xi Jinping in China.
Cyber security isn’t just an issue for governments and corporations, but an issue we all face—that’s because the favorite weapon of hackers and terrorists is your computer.
EC-Councils Rocket City TakeDownCon will not only provide the industrys best training to those who are looking to increase their cyber security savvy, but it will also provide the most affordability to those who have been hit by the sequester or other budgetary concerns. Coming to Huntsville, Alabama this July, the Rocket City TakeDownCon offers EC-Councils flagship certification, the Certified Ethical Hacker, as well as their Computer Hacking Forensic Investigator and Certified Security Analyst for $2495.
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out.