BestCyberNews: News Online

BCN+NAME1

Start knowing

Breaking

Showing posts with label World Technical New's. Show all posts
Showing posts with label World Technical New's. Show all posts

Nearly All SAP Systems are Vulnerable to Hack

10 years ago

Over 95 percent of SAP systems assessed had vulnerabilities that could lead to compromised data and disruption of critical business processes. On May 5, 2015, Onapsis revealed the three most common cyber attack vectors used for compromising SAP b...

Read More

Italian eyewear company Luxottica Working on Google Glass 2.0

10 years ago

An Italian eyewear company Luxottica said his company is working with Google engineers on not just one, but two new versions of the Google's Internet-connected eyewear device. Luxottica is better known for its two famous brands owns brands Oakley...

Read More

China Using ‘Great Cannon’ Program for Cybercensors to Down Internet websites

10 years ago

China's cybercensors have long used a "Great Firewall" to block its citizens from reading critical articles from Western news websites or consuming other content it disapproves. The tool marked a shift by Beijing towards an offensive strategy i...

Read More

Facebook Planning to integrate WhatsApp into Facebook Android App

10 years ago

Facebook has started planning to a new update in its 'Facebook for Android' app that includes the first major integration of popular messaging service WhatsApp. According to this update, a year after of acquiring WhatsApp Messenger, Facebook has ...

Read More

TrueCrypt Audit Confirms There is no NSA Backdoor Software

10 years ago

The popular encryption software TrueCrypt public audit has concluded that there is no government backdoors or unfixable vulnerabilities that could kill the project flat. TrueCrypt called it quits last year unexpectedly, saying that it "may contai...

Read More

Encrypted Communications are Biggest Problem for Security Agencies Tackling Terrorism

10 years ago

Europol police chief Rob Wainwright has warns sophisticated online communications are the biggest problem for security agencies tackling terrorism. Encryption is one of the most basic technique used by tech companies to protect their users' commu...

Read More

Facebook’s Building Aquila Drones to Provides Internet Via Lasers

10 years ago

Facebook is building a V-shaped unmanned aerial vehicles (UAVs), also known as drones, to help the company with its Internet.org project that aims to beam Internet access to the 5 billion people that don't have it yet. At the F8 conference Thursd...

Read More

Reuters Websites Blocked by China

10 years ago

The New York Times, Bloomberg News and The Wall Street Journal have previously been taken off the grid in China, on Friday they are recently blocked the Reuters news websites. The English and Chinese version were inaccessible but the Chinese clie...

Read More

9 Years old Boy Demonstrated How to Hack Android Smartphone

10 years ago

A 9-year-old cyber-security expert Reuben Paul has demonstrated how hackers could steal contacts, call logs and messages within just 15 minutes and he even offered to demonstrate on Friday. On Friday, Harmony School of Science third-grader Reuben...

Read More

Stay Away Your Systems From USB Killer

10 years ago

The USB Killer is a booby trap designed to look like an ordinary USB drive, hand-made USB drive that will "burn down" your laptop if you insert it into your USB slot. The “USB Killer” device was created by a do-it-yourself hardware enthusiast who...

Read More

UK Intelligence Agency GCHQ Spied on Thousands of People

10 years ago

Britain’s communications intelligence agency GCHQ illegally spied on more than 6,000 people in 24 hours have signed up to a campaign. On Monday, privacy International launched the campaign in the wake of a court ruling this month that said regula...

Read More

Helpouts Support Service Shutting Down By Google

10 years ago

Google was announced that they are shutting down its video tutorial service Helpouts on April 20, 2015 because it is not growing fast enough. It has been decided that there just is not enough interest to warrant keeping it running. Google Helpo...

Read More

Hackers, Spies and Criminals Can Listen Your Phone Calls and Read Messages

10 years ago

German Security researchers was discovered the massive security flaws that could be hackers, spies and cyber criminals can able to listen private phone calls and intercept text messages on a potentially massive scale. The Cellular company netwo...

Read More

Google Introduces New reCAPTCHA System : to find Human or Robot

10 years ago

As Google recently announced reCAPTCHA, this will protects the websites you love from spam and abuse. So, when you go online say, for some last-minute holiday shopping. You won't be competing with robots and abusive scripts to access sites. Captc...

Read More

More Than 400 ‘Dark Market’ Websites are Seized by FBI

10 years ago

On November 5, the FBI arrested 26-year-old Blake "Defcon" Benthall of San Francisco, who is allegedly the owner of online marketplace Silk Road 2.0, which was seized and closed down. Silk Road, in the same manner as a number of other darkweb s...

Read More

Now We Can Able To Access Facebook in Anonymous Network Tor

10 years ago

Facebook was implemented a new way for users to access its site via Tor “without losing the cryptographic protections provided by the Tor cloud” and disclosing their location. People connect to Facebook in many different ways, which is why we h...

Read More

Kmart Data Breach Exposes Credit Card Information

11 years ago

Kmart has been targeted in a data breach that exposed the debit and credit card information of customers. Sears Holding Corp. said in a Friday statement it is working with federal agents and a private security firm to investigate the breach of its...

Read More

Hackers’ Attack on JPMorgan Chase Affects Millions

11 years ago

A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. The details of the...

Read More

New documents show legal basis for NSA surveillance programs

11 years ago

Documents released by the U.S. government show it views an executive order issued in 1981 as the basis of most of the National Security Agency's surveillance activities, the American Civil Liberties Union said on Monday. The NSA relied on Execu...

Read More

Is new "Bash Bug" worse than Heartbleed?

11 years ago

Internet security experts are warning that a newly-discovered programming flaw known as the "Bash Bug" or "Shellshock" may pose a serious threat to millions of computers and other devices such as home Internet routers. Even the systems used to run...

Read More