New: attackersAll contenthive-129948hive-196917krhive-166405steemhive-180932photographyhive-183959hive-185836zzanhive-150122hive-183397hive-144064hive-188619hive-184714hive-101145uncommonlabhive-103599hive-145157hive-193186bitcoinhive-139150hive-109690hive-138689hive-180301TrendingNewHotLikersdarkbloodprince (25)in whatsapp • 6 years agoWhatsApp call exploit let attackers slip spyware on to phonesWhatsApp appears to have been the inadvertent conduit for a surveillance campaign. Both WhatsApp and Israeli software developer NSO Group have confirmed that an exploit in WhatsApp's voice calling…sibgatullah (33)in busy • 7 years agoThe attackers on journalists demanded the arrest of them on Saturday 6P10.8-H(33.34) The attackers on journalists demanded the arrest of them on Saturday Journalists' leaders demanded the arrest of attackers on journalists during the gathering of protesters demanding a…komoniok (43)in security • 7 years agoHackers Technics and Incident Handling of MEW Account...Hackers technics and incident handling: What is the need for an account without passwords recovery in this era of blockchain technology? My MEW (myetherwallet) was hacked and all coins and aidrop…noni92 (33)in thegreatest • 7 years agoFootballFootball has changed alot over the years from when a million pound player was hard to come by to today when hundreds of millions of pounds and euros are spent on just a player. Money that could be…datokmuda (30)in football • 7 years agoWhat? Oscar attacked in the chinese league? No matter he status of star playersconverter (32)in mercatox • 7 years agoDDoS attackers increasingly targeting cryptocurrency exchangesDear steemit members, it is so much very bad news for us DDoS attackers increasingly targeting cryptocurrency exchanges. MERCATOX EXCHANGER has been gone Technical Maintenance aftr DDos attacked…zeroshiki (56)in hijack • 8 years agoAttackers can use video subtitles to hijack your devicesBe careful before you fire up media player software to play that foreign-language movie -- it might be a way for intruders to compromise your system. Check Point researchers have discovered an…