The Hacker News | Biggest Information Security Channel

Facebook Open URL Redirection vulnerability

Facebook Open URL Redirection vulnerability

Security Researcher Dan Melamed discovered an Open URL redirection vulnerability in Facebook ...
Smartphones, A Perfect Cyber Espionage and Surveillance Weapon

Smartphones, A Perfect Cyber Espionage and Surveillance Weapon

The use of mobile devices in government environments concerns the secret service of any states, cybe...
Critical vulnerability in Twitter allows attacker to upload Unrestricted Files

Critical vulnerability in Twitter allows attacker to upload Unrestricted Files

Security expert Ebrahim Hegazy , Cyber Security Analyst Consultant at Q-CERT, has found a seriou...
Short Password Reset code vulnerability allows hackers to brute-force many websites

Short Password Reset code vulnerability allows hackers to brute-force many websites

Yesterday we received a vulnerability report in web applications from some unknown Indian Hacke...
Cybercriminals using hijacked Cloud hosting accounts for targeted attacks

Cybercriminals using hijacked Cloud hosting accounts for targeted attacks

US Cloud hosting providers are constantly targeted by cyber crime according the revelations of...
Drupal resets 1 Million Passwords after Data Breach

Drupal resets 1 Million Passwords after Data Breach

A Drupal data breach was announced by the official Drupal Association, that Passwords for almost on...
U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites

U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites

In the recent months I had the opportunity to conduct an interesting study on the use of Social...
Anonymous Hackers Launch #OpUSA against US Banking and Government Agencies

Anonymous Hackers Launch #OpUSA against US Banking and Government Agencies

#OpUSA campaign is officially started, the day has come, today May 7 as announced by Anonymous ...
Internet Explorer zero-day exploit targets U.S. nuke researchers

Internet Explorer zero-day exploit targets U.S. nuke researchers

Security researchers revealed that series of " Watering Hole " has been conducted expl...
Fraud-as-a-Service of Zeus Malware advertised on social network

Fraud-as-a-Service of Zeus Malware advertised on social network

Cyber crime enterprise is showing a growing interest in monetization of botnets , the most targ...
Anonymous #OpIsrael, cyber crime and assumptions on state-sponsored interference

Anonymous #OpIsrael, cyber crime and assumptions on state-sponsored interference

Last April 7th the Anonymous collective hit the Israeli networks with a huge as historic offens...
Stuxnet 0.5 : Symantec study reveals Stuxnet was dated 2005

Stuxnet 0.5 : Symantec study reveals Stuxnet was dated 2005

Today social media are spreading a shocking news, authors of Stuxnet virus that hit Iranian nuc...
What does the Poetry with Citadel trojan ?

What does the Poetry with Citadel trojan ?

Recently we published an article on the attacks against Japanese banks using a new variant of the po...
Dissecting a mobile malware

Dissecting a mobile malware

The capillary diffusion of mobile devices, the lack of security systems on these platforms and l...
The use of passwords in a technological evolution

The use of passwords in a technological evolution

Every day we read about an incredible number of successful attacks and data breaches that expl...