The Hacker News | Biggest Information Security Channel

Hacking Instagram Accounts using OAuth vulnerability

Hacking Instagram Accounts using OAuth vulnerability

' Nir Goldshlager ' known as Facebook hacker and founder of Break Security  , who report...
New Apache backdoor serving Blackhole exploit kit

New Apache backdoor serving Blackhole exploit kit

A new sophisticated and stealthy Apache backdoor meant to drive traffic to malicious websites se...
Apple App Store was vulnerable for more than Half year

Apple App Store was vulnerable for more than Half year

A Google developer helps Apple to fixed a security flaw in its application store that for years has ...
Security firm Bit9 hacked, Stolen Digital Certs Used To Sign Malware

Security firm Bit9 hacked, Stolen Digital Certs Used To Sign Malware

Bit9 disclosed Friday that hackers had stolen digital code signing certificates from its network and...
Flaw in Intel Ethernet controller exposes to 'packet of death' attack

Flaw in Intel Ethernet controller exposes to 'packet of death' attack

The hardware qualification is a very important issue, recent vulnerabilities discovered in network...
Chinese malware campaign 'Beebus' target US defense industries

Chinese malware campaign 'Beebus' target US defense industries

A Chinese malware campaign called ' Beebus ' specifically targeting the aerospace and defens...
The use of passwords in a technological evolution

The use of passwords in a technological evolution

Every day we read about an incredible number of successful attacks and data breaches that expl...
Cisco Linksys routers vulnerable to remote zero-day exploit

Cisco Linksys routers vulnerable to remote zero-day exploit

A zero-day vulnerability has been discovered in popular Cisco Linksys routers that allows hackers ...
Running Desktop Apps on Windows RT, The Hackers Way!

Running Desktop Apps on Windows RT, The Hackers Way!

A hacker claims to have found a method in the code integrity mechanism in Windows RT, that allow o...
Internet Explorer 6, 7 and 8 vulnerable to remote code execution

Internet Explorer 6, 7 and 8 vulnerable to remote code execution

Last Friday, we reported that the website of the U.S. Council of Foreign Relations was allegedly...
Facebook Camera App Vulnerable to Man in The Middle Attack

Facebook Camera App Vulnerable to Man in The Middle Attack

Egypt-based security researcher reported that Facebook Camera App for mobiles are Vulnerable to M...
iPhone Instagram users vulnerable to hackers

iPhone Instagram users vulnerable to hackers

Instagram - Facebook’s popular photo sharing app for iOS, is currently has a vulnerability that co...
Ministry of Justice of Qatar vulnerable to hackers

Ministry of Justice of Qatar vulnerable to hackers

Hacker Going by name "human mind cracker" discovered SQL injection vulnerability in offici...
Inj3ct0r Team found XSS Vulnerability on MSN website

Inj3ct0r Team found XSS Vulnerability on MSN website

A particular class of attacks commonly referred to as “code insertion” and often “ Cross-Site ...
PayPal Bug Bounty Program - playing fair ?

PayPal Bug Bounty Program - playing fair ?

Bug Bounty program, where white hat hackers and researchers hunt for serious security vulnerabi...
XSS Vulnerability in Apple website

XSS Vulnerability in Apple website

A 16 years old Spanish Whitehat hacker going by name " The Pr0ph3t " found XSS Vulnera...
Airline, Myspace, Banks, Government websites vulnerable to Hackers

Airline, Myspace, Banks, Government websites vulnerable to Hackers

Cross Site Scripting (XSS) is currently the most common vulnerability in the world. This is vu...
NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)

NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)

Yesterday, we report about the security breach in US Government computers belongs to NASA  restrict...
Smartphone wireless chipset vulnerable to DoS attack

Smartphone wireless chipset vulnerable to DoS attack

Security researcher Andres Blanco from CoreSecurity discovered a serious vulnerability in two Wirel...
Medical Devices Vulnerable to Hacking

Medical Devices Vulnerable to Hacking

A heart defibrillator remotely controlled by a villainous hacker to trigger a fatal heart attack? Ye...