Passengers witnessed pornostar on their smartphones and tablets. Hackers hacked free Wi-Fi in the Moscow metro around 11:30. As a result of bullying thousands of passengers saw porn on the screens instead of the usual home page and invitations to join the network. “I was driving on the gray branch around 11:30, near the station […]
Tag: Hackers
iOS 9 will bury jailbreak
Apple has developed for the upcoming release of iOS 9 and OS X 10.10 new protection technology, which casts doubt on the future of
Apple urged Obama to cancel bookmarks on iPhone
The attempts of Barack Obama and the FBI legally obligate the smartphone manufacturers to embed bookmarks for special services in the encryption algorithms were criticized Apple and Google. IT Corporation has written to the President of the United States the appropriate letter in which the authors — and that representatives of more than 140 leading […]
Experts discovered a vulnerability in Safari that allows you to redirect users to malicious sites
The information security experts from the company Deusen reported a new vulnerability found in mobile and desktop Safari. Using “holes” security attackers can redirect users from one site to any other. Discovered in epplovskom browser vulnerability allows hackers to make the user by typing the usual address of a trusted resource, was on the malicious […]
Microsoft will place a watermark on pirated copies of Windows 10
Recent post about what to upgrade to Windows 10 will be able even to owners of pirated copies of the operating system that pleased many. Today, Microsoft has clarified the situation for owners of unlicensed OS. Company when you upgrade such systems to the latest version of Windows 10 will be placed on the desktop […]
Hackers broke into the Starbucks app and EN masse to withdraw money from the card users
Hackers broke into the mobile app to make payments in a popular coffee shop chain Starbucks. In addition to payment information, the criminals got into the disposal of the users ‘ personal data. The fraudsters managed to organize hacking mobile wallets so that with stolen payment amount of data they can within minutes to cash […]