Thursday, February 7, 2019

Critical Zcash Bug Could Have Allowed 'Infinite Counterfeit' Cryptocurrency

The Hacker News Daily Updates
Newsletter
cover

Security Architecture For An Email API

Read the Nylas Security and Privacy Architecture White Paper

Download Now Sponsored
LATEST NEWS Feb 7, 2019

Get a Lifetime Subscription to Unlimited VPN for just $59.99 (5 Devices)

For all of the undeniable conveniences the Internet has brought us, it's becoming an increasingly dangerous place to be. Both individual hackers and entire government agencies are now able to hack into your computer or smartphone from across the globe and steal everything from your browsing ...

Read More
Twitter Facebook LinkedIn

Android Phones Can Get Hacked Just by Looking at a PNG Image

Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps. Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three ...

Read More
Twitter Facebook LinkedIn

Critical Zcash Bug Could Have Allowed 'Infinite Counterfeit' Cryptocurrency

The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that could have allowed an attacker to coin an infinite number of Zcash (ZEC). Yes, infinite… like a never-ending source of money. Launched ...

Read More
Twitter Facebook LinkedIn

How to Delete Accidentally Sent Messages, Photos on Facebook Messenger

Ever sent a message on Facebook Messenger then immediately regretted it, or an embarrassing text to your boss in the heat of the moment at late night, or maybe accidentally sent messages or photos to a wrong group chat? Of course, you have. We have all been through drunk texts and embarrassing ...

Read More
Twitter Facebook LinkedIn

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

You've always been warned not to share remote access to your computer with any untrusted people for many reasons—it's basic cyber security advice, and common sense, right? But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers? Security ...

Read More
Twitter Facebook LinkedIn
cover

Security Architecture For An Email API

Read the Nylas Security and Privacy Architecture White Paper

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home