The Hacker News — Most Popular Cyber Security, Hacking News Site: Cyber threats

New Malware Family Uses Custom UDP Protocol for C&C Communications

New Malware Family Uses Custom UDP Protocol for C&C Communications

June 26, 2018Wang Wei
Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking gr...
MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks

MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks

April 19, 2016Swati Khandelwal
In Brief What if we could Predict when a cyber attack is going to occur before it actually happens and prevent it? Isn't it revolu...
Obama's Executive Order urges Companies to Share CyberSecurity Threat Data

Obama's Executive Order urges Companies to Share CyberSecurity Threat Data

February 15, 2015Mohit Kumar
President Barack Obama signed an executive order on Friday that encourages and promotes sharing of information on cybersecurity threats...
Released Emails Show 'Google in a Relationship With NSA'

Released Emails Show 'Google in a Relationship With NSA'

May 06, 2014Wang Wei
Edward Snowden 's leaks last year questioned the integrity of several big and reputed companies such as Apple, Google and Microsoft...
Facebook Unveils ThreatData, a framework for Web Security

Facebook Unveils ThreatData, a framework for Web Security

March 26, 2014Swati Khandelwal
Defending and Analysis of online threats and malwares   have become more challenging nowadays and especially for larger businesses like...
Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

March 15, 2014Swati Khandelwal
So, How do you currently monitor your logs and events, including network, servers, databases, applications, your router, firewall or Win...
AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

March 14, 2014Swati Khandelwal
IT Infrastructure of organizations is growing ever more distributed, complex and difficult to manage. To manage such networks, a log man...
Police Ransomware threat of huge Fine forced Family to Commit Suicide

Police Ransomware threat of huge Fine forced Family to Commit Suicide

March 13, 2014Swati Khandelwal
Till Now we all have heard about the Ransomware Malware that encrypts your files or lock down your computer and ask for a random amount...
Beware! Cyber Criminals may spoil your Valentine's Day

Beware! Cyber Criminals may spoil your Valentine's Day

February 10, 2014Swati Khandelwal
Valentine's Day   - a day of hearts, Chocolates, Flowers and Celebrations when people express their emotions to their loved ones and...
BIOS Malware that can remotely destroy any computer, NSA claimed

BIOS Malware that can remotely destroy any computer, NSA claimed

December 16, 2013Wang Wei
During a CBS Interview show " 60 Minutes ", The National Security Agency (NSA) officials claimed that China has developed a BIOS ...
China: 'We are ready for International cooperation to deal with cyber security Challenges'

China: 'We are ready for International cooperation to deal with cyber security Challenges'

November 06, 2013Wang Wei
Yesterday at Stanford University in the United States, Cyber Security Experts and Leaders from more than 40 countries gathered to talk a...
DDoS Attacks : A Serious unstoppable menace for IT security communities

DDoS Attacks : A Serious unstoppable menace for IT security communities

October 18, 2013Anonymous
It should be the busiest day of the year for your business, but your website has just disappeared off the Internet and orders have dried...
National Security threats to be detailed at 'The Hackers Conference' 2013 | #THC2013

National Security threats to be detailed at 'The Hackers Conference' 2013 | #THC2013

August 17, 2013Mohit Kumar
The recent “disconcerting" reports that India was being spied upon by American intelligence agencies has opened an all new chapt...
Cyber security scenario according to WebSense

Cyber security scenario according to WebSense

March 11, 2013Anonymous
It's time of stocktaking, principal security firm are proposing their analysis to synthesize actual situation on cyber security, 201...
Cyber threats a major risk to business

Cyber threats a major risk to business

October 22, 2012Mohit Kumar
When it comes to security, small and midsize businesses are largely unaware of the risks they face. Cybercrime is a serious problem whic...