The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security News: Ebook download

How to Build a Successful Incident Response Plan

How to Build a Successful Incident Response Plan

November 13, 2015Wang Wei
The fight to protect your company's data isn't for the faint of heart. As an embattled IT warrior, with more systems, apps, and users ...
Julian Assange's Book 'Cypherpunks' - Freedom and the Future of the Internet

Julian Assange's Book 'Cypherpunks' - Freedom and the Future of the Internet

October 27, 2012Mohit Kumar
Julian Assange publish a book based on his interview " Cypherpunks " on " The World Tomorrow ", his controversial talk ...
Getting Started: Your Guide to Windows 8

Getting Started: Your Guide to Windows 8

October 21, 2012Mohit Kumar
Back in 1991, Microsoft released their first version of Windows, a mouse-driven graphical user interface that revolutionized the way we ...
Beginner Guide to SSL Certificates

Beginner Guide to SSL Certificates

October 17, 2012Mohit Kumar
The Internet has created many new global business opportunities for enterprises conducting online commerce. However, the many security r...
HackerProof : Your Guide To PC Security

HackerProof : Your Guide To PC Security

October 14, 2012Mohit Kumar
With over 140,000 known computer viruses and 85,000,000 spam emails sent out each day, the likelihood of your PC coming into contact wit...
MALWARE - June 2012 | The Hacker News Magazine Released

MALWARE - June 2012 | The Hacker News Magazine Released

June 15, 2012Mohit Kumar
MALWARE - June 2012 | The Hacker News Magazine Released Welcome readers, techies working in the darkness of night and any other internet s...
Hacktivism - The Hacker News Magazine - May 2012 Issue

Hacktivism - The Hacker News Magazine - May 2012 Issue

May 05, 2012Mohit Kumar
Welcome cyber space readers and internet junkies from around the world. May brings us into an in-depth look at our favorite topic: Hacktiv...
[ Call for Articles ] The Hacker News Magazine - Hacktivism Special Edition - May 2012

[ Call for Articles ] The Hacker News Magazine - Hacktivism Special Edition - May 2012

April 13, 2012Mohit Kumar
[ Call for Articles ] The Hacker News Magazine - Hacktivism Special Edition - May 2012 A big shout out to all you cowboys and cowgirls wh...
Cyber Warfare - The Hacker News Magazine April 2012 Edition | Issue 10

Cyber Warfare - The Hacker News Magazine April 2012 Edition | Issue 10

April 01, 2012Mohit Kumar
Cyber Warfare - The Hacker News Magazine April 2012 Edition Call it Cyber Warfare, Terrorism, Computer Mania this month The Hacker News t...
Call for Article - THN Magazine "Cyber Warfare" April Issue

Call for Article - THN Magazine "Cyber Warfare" April Issue

March 10, 2012Mohit Kumar
Call for Article - THN Magazine "Cyber Warfare" April Issue As we move through March Madness and the recent arrests of our cy...
Censorship - Global Concern : THN Magazine March Edition

Censorship - Global Concern : THN Magazine March Edition

March 01, 2012Mohit Kumar
Censorship - Global Concern : THN Magazine March Edition It is March Madness at The Hacker News as we release the latest edition of our mag...
Hackers to release 0-days in comics

Hackers to release 0-days in comics

February 22, 2012Mohit Kumar
Hackers to release 0-days in comics Hackers frequently disclose vulnerabilities in various products, but taking it to a whole new level, now...
Book Review : Defense against the Black Arts

Book Review : Defense against the Black Arts

January 20, 2012Mohit Kumar
Book Review : Defense against the Black Arts How Hackers Do What They Do and How to Protect against It Ben Rothke  write a review of a   ne...
Giveaway : Win a Backtrack or iPhone book

Giveaway : Win a Backtrack or iPhone book

January 19, 2012Mohit Kumar
Giveaway: Win a Backtrack or iPhone book After the huge success of our earlier giveaway we have again teamed up with Packt Publishing an...
Book Review: BackTrack 4: Assuring Security by Penetration Testing

Book Review: BackTrack 4: Assuring Security by Penetration Testing

January 19, 2012Mohit Kumar
Book Review: BackTrack 4: Assuring Security by Penetration Testing This review is for the BackTrack 4: Assuring Security by Penetration Tes...
Book Review: IPhone Applications Tune-up

Book Review: IPhone Applications Tune-up

January 18, 2012Mohit Kumar
Book Review: IPhone Applications Tune-up Packt recently published a new book- IPhone Applications Tune-up . The book is of course about prog...
The Cloud Security Rules Book - Technology is your friends & Enemy

The Cloud Security Rules Book - Technology is your friends & Enemy

January 18, 2012Mohit Kumar
The Cloud Security Rules Book - Technology is your friends & Enemy Well-known security experts decipher the most challenging aspect of ...
Wireless Penetration Testing Series Part 1: Getting Started with Monitoring and Injection

Wireless Penetration Testing Series Part 1: Getting Started with Monitoring and Injection

January 07, 2012Mohit Kumar
Wireless Penetration Testing Series Part 1 : Getting Started with Monitoring and Injection We had promised a while back that we would start...
From the In-Security Land to Security in the Cloud

From the In-Security Land to Security in the Cloud

January 04, 2012Mohit Kumar
From the In-Security Land to Security in the Cloud " This article aims to share with you some thoughts and concepts associated with...
#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released

#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released

January 03, 2012Mohit Kumar
#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released As we promised last month, The Hacker News along with Secu...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.