黑客:第3页

Noticias

Un reporte de seguridad indica que un "bug" en Roblox podría robar datos de los usuarios

El problema se encuentra en Synapse X, una aplicación utiilzada para modificar y hacer trampa en el juego.

Noticias

Microsoft confirma haber sido atacado por LAPSUS$, ¿qué sabemos de este grupo de hackers?

Los piratas cibernéticos publicaron parte del código fuente de Bing y Cortana para demostrar su poderío; Microsoft es la cuarta empresa grande que logran vulnerar.

Data & Recovery

Microsoft confirms to have been attacked by LAPSUS$, what do we know about this group of hackers?

Hackers released some of the source code for Bing and Cortana to demonstrate their might; Microsoft is the fourth large company that they manage to violate.

Noticias

Conoce al IT Army of Ukraine, el ejército de voluntarios que trabajan para hackear sitios rusos

El llamado al "crowdhacking" fue hecho por el ministro de transformación digital de Ucrania y vaya si ha dado resultado…

Data & Recovery

Meet the IT Army of Ukraine, the army of volunteers working to hack Russian sites

The call for "crowdhacking" was made by Ukraine's minister for digital transformation and boy has it worked...

Science & Technology

The Correlation Between Covid-19 and Cybercrime

The World Economic Forum presented its first-ever Global Cybersecurity Outlook report, which highlights trends and examines anticipated cybersecurity challenges.

Noticias

Los datos de 300,000 usuarios de Mercado Libre han sido vulnerados

El ataque se le atribuye al hacker LAPSUS$ y podría haber dejado expuestos datos sensibles de usuarios de México y Latinoamérica.

Data & Recovery

The data of 300,000 users of Mercado Libre has been violated

The attack is attributed to the hacker LAPSUS$ and could have exposed sensitive data of users from Mexico and Latin America.

Business News

Hacker, 19, Claims He Was Able to Remotely Access 25 Tesla Vehicles Worldwide Due to Software Flaw

In a series on Twitter on Tuesday, David Colombo claimed that he had been able to remotely access the vehicles and disable Sentry Mode-a feature that allows Tesla owners to monitor suspicious activities-unlock doors and windows, and start the cars without keys.

Science & Technology

Making Data Security Compliance a Revenue Driver

The SolarWinds cybersecurity attack and CNA breach have made corporate data security certification a higher priority than ever - not least in the customer acquisition process - and there are ways of making this significant investment pay additional dividends.

Science & Technology

What Online Integrity Will Look Like In 2022

The spread of disinformation, hate speech, and extremism also poses genuine threats.

Noticias

Cómo será la integridad en línea en 2022

La propagación de la desinformación, el discurso del odio y el extremismo también plantea amenazas genuinas.

Science & Technology

8 Ways a Data Breach Could Take Out Your Company Tomorrow

If your company uses, collects, stores or relies on first-party data (and what successful company these days doesn't?), you face all kinds of security-related risks.

Tecnología

8 formas en las que una filtración de datos podría acabar con su empresa mañana

Si su empresa utiliza, recopila, almacena o se basa en datos de origen (¿y qué empresa de éxito en estos días no lo hace?), Se enfrenta a todo tipo de riesgos relacionados con la seguridad.

Science & Technology

Why More and More Companies Are Embracing Web 3.0

The phrase "Web 3.0" is buzzing now, but how will it affect entrepreneurs? It's much better than you think.