Tagged: Hackers

0

The hackers posted a database of 773 millions of e-mail addresses and 22 million passwords

More 87 gigabytes of passwords and addresses was leaked. The data collected in the folder “Collection # 1” and uploaded it to a cloud service MEGA and “popular hacking forum”.

The hackers posted a database of 773 millions of e-mail addresses and 22 million passwords

Hackers have built a formidable database of nearly 773 million e-mail addresses and 22 million unique passwords. This was told by Troy hunt, a specialist in the field of computer security. For the first time the Internet got 140 million addresses and 10 million passwords, other data were previously published. …

0

Apple criticizes competitors for the disregard for the safety of users, and I remember her naked celebrities

To hint at what the competitors disregard the privacy of users — a risky advertising move, he told reporters CNBC. They remembered the cupertinos scandal with leaked personal photos 2014.

Apple criticizes competitors for the disregard for the safety of users, and I remember her naked celebrities

This week cupertinos once again reminded users — the business of Apple is built on the basis of privacy and security. This is a very risky position, given the difficult situation with privacy all over the world (especially China), as well as the dangers faced by cloud backup service, consider …

0

Criminals use Apple AirPods to eavesdrop on the conversations of users

The journalists of the Daily Mail UK revealed a method that allows attackers to eavesdrop on others ‘ conversations through Apple AirPods. The main tool Scam has become a function of “Live Listen”, designed for users with hearing problems.

Criminals use Apple AirPods to eavesdrop on the conversations of users

According to the British journalists, the “Live Listen”, designed for those users AirPods are experiencing hearing problems, is successfully used by hackers for eavesdropping other people’s conversations. This option was introduced in iOS 12. It …

0

For the full iPhone known “broker of vulnerability” is willing to pay $2 000 000

The company Zerodium, which is called one of the most famous brokers of vulnerabilities announced an increase in payments for tools to hack iMessage and compromise all the iPhone.

For the full iPhone known "broker of vulnerability" is willing to pay $2 000 000

Zerodium increased amount of remuneration for the next zero-day vulnerability:

  • $2 million (instead of $1.5 million) for remote iOS that allows you to compromise the system without user intervention.
  • $1.5 million (instead of $1 million) for a remote jailbreak, requiring minimal user
0

Do you trust all the apps that are downloading on your iPhone?

Experts in the field of cybersecurity has found more than a dozen apps for iPhone, secretly interacting with a server associated with Golduck. This malware at the time caused a lot of problems for Android users. Infecting the popular classic gaming applications, Golduck allows attackers to execute arbitrary commands and send SMS from the victim’s phone. About it reports TechCrunch, citing studies Wandera.

Do you trust all the apps that are downloading on your iPhone?

The program Golduck is known for more than a year, since, as was first …

0

What is Denuvo and why gamers hate it

Denuvo is a kind of “digital restrictions management” or “DRM”, if abbreviated, which means technical means of copyright protection. Technology Denuvo frustrating gamers for many years, and it looks like there’s a good reason.

What is Denuvo and why gamers hate it

What is Denuvo

First and foremost, the decision Denuvo is provided for game developers. They can license this technology to integrate it in their computer games. After the integration of the means for copyright protection provides anti-piracy technology prevents …

0

The best units in 2018, from smartphones to headphones

Wired magazine put together a list of the best devices in 2018. Given an adapted version of the collection.

The best units in 2018, from smartphones to headphones

Best mobile device — iPhone XR

This iPhone, which is not the best camera and screen. But he has a better autonomy and value for money with a number of useful features.

The best units in 2018, from smartphones to headphones

The smartphone offers a more affordable ticket to the future of personal electronics. And manages to catch up with the best smartphones for $ 1,000 at a price of only $ 750.

Best audio

0

Facebook: Zuckerberg no one was forbidden to use the iPhone, it just hurt to cook

The press service of Facebook has put forward a refutation of the article by the New York Times, which claimed that CEO mark Zuckerberg ordered the company management to use only Android smart phoneFacebook: Zuckerberg no one was forbidden to use the iPhone, it just hurt to cook

Some people suggest that Zuckerberg has taken this step because of the feud with Apple CEO Tim cook. Earlier we talked about the offense of the founder of Facebook’s criticism of cook.

Today, 15 November, the press service of Facebook in his statement began to deny many of the claims of the …

0

Stolen digital identity costs less than $ 50

“Kaspersky lab” has studied Dark Web and found that the cost of most digital personalities often does not exceed $ 50. The official press release published on the website of the company.

Stolen digital identity costs less than $ 50

Under the digital identity includes information Internet sites, information about banking cards, even the history of gaming applications and programs. Hacking such systems, the cost to the attackers is very cheap — about one dollar. For wholesale cybercriminals hackers have provided a whole discount …

0

A hacker has demonstrated a working jailbreak for iPhone iOS 12.1 XS Max

Developed by Liang Chen of Keen Security Lab, has posted on Twitter screen shots of iOS 12.1 and stated that it will introduce a working method hacking conference hackers POC 2018.

A hacker has demonstrated a working jailbreak for iPhone iOS 12.1 XS Max

iOS 12.1 + A12 = end of the war with iOS? I will speak at POC 2018 this Friday with the newest exploit for the iPhone XS Max.

The laboratory is Keen Tencent Security Lab was founded in January of 2016 to focus on the safety studies major operating systems of personal computers and mobile devices and …



f