#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

GENERAL NEWS | Breaking Cybersecurity News | The Hacker News

Suggested The Linux 3.1 Kernel logo

Suggested The Linux 3.1 Kernel logo

Sep 11, 2011
Suggested The Linux 3.1 Kernel logo This new logo was proposed just this weekend and the current discussion to see whether it will be accepted for Linux 3.1 can be found in this LKML thread . To mark the upcoming release of the Linux 3.1 kernel IBM's Darrick Wong has proposed changing the familiar solo-Tux logo to something more, well, befitting of the version number. This proposed logo for the Linux 3.1 kernel isn't to raise awareness for any animals or other causes. but to poke fun at Microsoft Windows 3.1. Darrick Wong of IBM has proposed replacing the Tux logo in the Linux 3.1 kernel with a new logo that makes mockery of Microsoft's Windows 3.1 operating system that began selling 19 years ago.
Hotmail, MSN, Office 365, live.com sites down (now up)

Hotmail, MSN, Office 365, live.com sites down (now up)

Sep 09, 2011
Hotmail , MSN , Office 365 , live.com sites down (now up) A number of Microsoft online services, including Hotmail, MSN, Office 365, and seemingly most if not all of *.live.com addresses are currently "experiencing an outage". MSN and Office 365 have already tweeted about it: The downtime, which happened on Friday at about 4am in the UK — 8pm on Thursday Pacific time (PDT) — was due to a domain name service problem, according to Microsoft. But Microsoft certainly isn't alone.Google has also seen its share of downtime. Just this past Wednesday, Google Docs was offline for about 30 minutes. In May, the company's Blogger service was unavailable for the greater part of a day.
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
Hacker Halted USA 2011 - 10 Reasons Why You Should Attend

Hacker Halted USA 2011 - 10 Reasons Why You Should Attend

Sep 08, 2011
Hacker Halted USA 2011 - 10 Reasons Why You Should Attend Hacker Halted is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers. Hacker Halted returns to Miami for the 3rd year in a row will be held in Miami on 25th and 27th October 2011. Participate and be part of one of the world's most recognized information security conference. Gain perspective through keynote addresses on the current state of information security as well as emerging trends and threats. An information security conference with a comprehensive agenda. Choose from the various focused tracks covering critical domains of information security. Match your informati
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
Cyberwar between Israel and Turkish Hacker

Cyberwar between Israel and Turkish Hacker

Sep 06, 2011
Cyberwar between Israel  and Turkish  Hacker Turkish hacker " TurkGuvenligi " hijacked some 350 Israeli websites on Sunday evening, launching a Domain Name System (DNS) attack on at least seven high-profile websites including The Telegraph, Acer, National Geographic, UPS and Vodafone as well. Visitors to some of the sites were diverted to a page declaring it was " World Hackers Day. " Hackers calling themselves the " TurkGuvenligi group " calimd the cyber-attack. "TurkGuvenligi translates as " Turkish security. " " The hack represents a 10%-15% spike compared to the average number of daily hacks of Israeli websites ," Shai Blitzblau, head of Maglan-Computer Warfare and Network Intelligence Labs, explained. Israel's military and security establishment has invested significantly in cyber-warfare programs in recent years and is considered one of the most advanced cyber-warfare forces in the world, both in attack and defense modes.T
Registry Decoder - Digital Forensics Tool

Registry Decoder - Digital Forensics Tool

Sep 06, 2011
Registry Decoder - Digital Forensics Tool Digital forensics deals with the analysis of artifacts on all types of digital devices. One of the most prevalent analysis techniques performed is that of the registry hives contained in Microsoft Windows operating systems. Registry Decoder was developed with the purpose of providing a single tool for the acquisition, analysis, and reporting of registry contents. Download Here
WikiLeaks.org under Cyber Attack after releasing U.S. diplomatic cables

WikiLeaks.org under Cyber Attack after releasing U.S. diplomatic cables

Aug 31, 2011
WikiLeaks.org under Cyber Attack after releasing U.S. diplomatic cables The WikiLeaks website, which contains thousands of U.S. embassy cables, has crashed in an apparent cyberattack. The anti-secrecy organization said in a Twitter message Tuesday that Wikileaks.org "is presently under attack." Wikileaks.org today released 250,000 U.S. diplomatic cables that have apparently caused grave concern in Western governments. The documents have already revealed that the U.S. has been spying on the United Nations Secretary General. State Department spokeswoman Victoria Nuland would not confirm the authenticity of the latest documents, but said " the United States strongly condemns any illegal disclosure of classified information. "
19 years old iPhone hacker Nicholas Allegra (comex) joins Apple

19 years old iPhone hacker Nicholas Allegra (comex) joins Apple

Aug 29, 2011
19 years old iPhone hacker Nicholas Allegra (comex) joins Apple 19 years old iOS hacker Nicholas Allegra, better known online as comex, has taken up an internship position at Apple, the company whose devices he has helped jailbreak for the past several years. Comex is most well known for building the one click iPhone jailbreaking site JailBreakMe.Com . This allows iPhone users to simply visit the site and click "install" to jailBreak and install Cydia . Allegra tweeted the news on Thursday, saying that he'd been pretty bored lately and that he'll start at Apple in two weeks. Jailbreakers say that they want to have more control over their phones, and programs like those Comex produces help iPhone users circumvent some of the strictures of Apple's iOS system. The programs also can cause security issues if programmers with more sinister intentions use them. From that angle, it's a great idea for Apple to take Comex on board. He definitely knows the holes in Apple's systems and,
Morto Worm spreading via Remote Desktop Protocol

Morto Worm spreading via Remote Desktop Protocol

Aug 29, 2011
Morto Worm spreading via Remote Desktop Protocol Organizations large and small often make use of Remote Desktop or Terminal Services to remotely connect to Windows computers over the Internet and internally. These tools use Microsoft's RDP protocol to allow the user to operate the remote system almost as if sitting in front of it. Such capabilities are helpful for not only legitimate users, but also for attackers. F-Secure is reporting that the worm is behind a spike in traffic on Port 3389/TCP. Once it's entered a network, the worm starts scanning for machines that have RDP enabled. Vulnerable machines get Morto copied to their local drives as a DLL, a.dll, which creates other files detailed in the F-Secure post. The emergence of this worm correlates with the increased volumes of TCP port 3389 traffic, reported by SANS Internet Storm Center a few days prior to the F-Secure report: The propagation approach employed by " Morto " is often used by penetration testers and human at
F-Secure : Chinese Government Launching Online Attacks

F-Secure : Chinese Government Launching Online Attacks

Aug 23, 2011
F-Secure : Chinese Government Launching Online Attacks According to F-Secure Chinese military documentary shows footage of gov't systems launching attacks against US target. China is often blamed for launching online attacks, but the evidence is almost always circumstantial. Many of the targeted espionage Trojans seem to come from China, but we can't actually prove it. However, some new evidence has just surfaced. On 17th of July, a military documentary program titled "Military Technology: Internet Storm is Coming" was published on the Government-run TV channel CCTV 7, Millitary and Agriculture (at military.cntv.cn ). The program seems to be a fairly standard 20-minute TV documentary about the potential and risks of cyber warfare. However, while they are speaking about theory, they actually show camera footage of Chinese government systems launching attacks against a U.S. target. This is highly unusual. The most likely explanation is that this footage ended up in
Call for Papers from DefCon Chennai (DC602028)

Call for Papers from DefCon Chennai (DC602028)

Aug 22, 2011
Call for Papers from DefCon Chennai (DC602028) Background: We are the Official DEF-CON Chennai Group [DC602028] The Event is taking place on 11th September 2011 at a resort in ECR Road Chennai,India. We will be having a Private conference room for the meet. Regarding Paper Submission We require uniqueness when it comes to Paper submission for DEF-CON Chennai DC602028. Uniqueness as Follows: -> Papers can be on your own research with proof of concept. -> Paper should be of current subject and not more than 1 year old. -> Topics of interest includes everything related to Security. -> Topics related to mobile security or Anroid Security . -> Any new methods of hacking or any 0day/tool disclosure Some of the Sample Topics = New threats faced by Corporate = Threats faced by Normal user from a Malicious person = Mobile security and Mobile Application = Denial of Service attack = Cyber laws = Forensics = Webapp Vulnerabilities = Online Fraud and Social E
Phone Hacker Forced to Disclose name, Who Told Him to Hack !

Phone Hacker Forced to Disclose name, Who Told Him to Hack !

Aug 22, 2011
Phone Hacker Forced to Disclose name, Who Told Him to Hack ! Court tells private investigator he must identify 'News of the World' executives who asked him to intercept voicemails. A private detective jailed for illegally intercepting voice-mail messages on behalf of a journalist at one of Rupert Murdoch's British newspapers has been ordered to reveal who asked him to carry out the phone hacking. Coogan's lawyers believe that the release of the names will demonstrate that there was widespread knowledge and authorisation of phone hacking among the defunct Sunday newspaper's senior figures. John Kelly of law firm Schillings told that Mulcaire, who is suing News International himself after it stopped paying his legal fees, would have to answer their questions in a formal document to be filed at the court before September. " He will now have to identify exactly who at the News of the World asked him to access the mobile phones of the named individuals and who
Samsung hires Android hacker Cyanogen

Samsung hires Android hacker Cyanogen

Aug 17, 2011
Samsung hires Android hacker Cyanogen Steve 'Cyanogen' Kondik is best known as the creator of the CyanogenMod for Android, an after market customised firmware bringing new features and functionality to the Android platform. There's no information yet on whether Samsung is interested in CyanogenMod, or more in Kondik himself, but the programmer and hacker has said the move will allow him to use his talents in " the real world ," while development of CyanogenMod continues as usual. The Cyanogen firmware caters to more than 40 different Android devices and brings such functionality as native theming, Free Lossless Audio Codec (FLAC), an OpenVPN client, USB tethering, and claims increased performance and reliability over official firmware releases. Kondik has on occasion received input from Google on the development of the platform and as of mid-July it had been downloaded and installed on more than half a million devices. [ source ]
Get Ready for Hacker Halted 2011, Miami 21-27 October

Get Ready for Hacker Halted 2011, Miami 21-27 October

Aug 16, 2011
Get Ready for Hacker Halted 2011 , Miami 21-27 October Hacker Halted returns to Miami for the 3rd year in a row. Following last year's success, we are expecting this year to be bigger and better. Hacker Halted will feature 4 focus tracks: 1.What's Hot – Featuring cutting-edge presentations on key topics and aspects of information security, including policies and management issues. 2.Cut the Crap, Show Me The Hack - highly technical track featuring no-nonsense technical security experts who demonstrate the latest hacks, reveal new zero-days, and showcase the most current threats and vulnerabilities. 3.Securing SCADA and Critical Infrastructures - Following the 2010 appearance of the groundbreaking Stuxnet worm, SCADA security has become an issue of growing concern. This track will feature high-level presentations from noted experts in the field. 4.Up in the Clouds – Focused on cloud computing and the security elements surrounding it. Since 2004, Hacker Halted has been held
Facebook : 'No more anonymous on Internet'

Facebook : 'No more anonymous on Internet'

Aug 16, 2011
Facebook : ' No more anonymous on Internet ' The sister of Facebook CEO , Randi Zuckerberg  wants to put an end to online anonymity.Fcaebook wants to force people to use their real names on Profiles. Randi Zuckerberg is Facebook's marketing director, believes users would act much more responsibly on the Internet if real names at all times were compulsory. Randi Zuckerberg was speaking during a presentation hosted on Tuesday by Marie Claire magazine on cyberbullying and social media. She said " the use of real names online could help curb bullying and harassment on the web.I think anonymity on the Internet has to go away... People behave a lot better when they have their real names down. ... I think people hide behind anonymity and they feel like they can say whatever they want behind closed doors. " She added, " There's so much more we can do...We're actively tying to work with partners like Common Sense Media and our safety advisory committee. &q
DerbyCon 2011 Security Conference - Louisville, Kentucky

DerbyCon 2011 Security Conference - Louisville, Kentucky

Aug 13, 2011
DerbyCon 2011 Security Conference - Louisville, Kentucky  Welcome to a new age in security conferences, a new beginning, and a new way to share in the information security space. Our goal is to create a fun environment where the security community can come together and share ideas. Before we even released the CFP, our speaker list has filled up with of some of the industry's best and brightest minds. That fact alone shows that DerbyCon is poised to change the face of security cons. Some of these speakers include: Dave Kennedy (ReLIK) - Founder DerbyCon, Creator Social-Engineer Toolkit, Fast-Track Adrian Crenshaw (Irongeek) - Founder, DerbyCon, Irongeek.com, Co-Host, ISD Podcast Martin Bos (PureHate) - Founder, DerbyCon, Question-Defense, BackTrack Developer HD Moore (hdm) - Founder Metasploit, CSO Rapid7 Chris Nickerson - Founder Lares Consulting, Exotic Liability Kevin Mitnick - Founder, Mitnick Security Consulting Ed Skoudis - Founder, InGuardians, SANS Instructor Bruce
UNITED Security Summit 2011, 19-20 September - San Francisco

UNITED Security Summit 2011, 19-20 September - San Francisco

Aug 11, 2011
UNITED Security Summit 2011 , 19-20 September - San Francisco The UNITED Security Summit is focused on innovation and collaboration in the security community. Bringing together security decision makers, practitioners, commercial vendors, open source projects and academia, the Summit highlights technologies and approaches that will help organizations better cope with the increased security threats they are seeing on a daily basis.Based on the anatomy of a breach, the Summit provides educational and interactive sessions that will reflect on the fundamental security challenges from four perspectives through a common lens. Date : 19 September-20 September 2011 Location : Hyatt Fisherman's Wharf, San Francisco, USA
HKEx - Hong Kong stock exchange Hacked

HKEx - Hong Kong stock exchange Hacked

Aug 11, 2011
HKEx - Hong Kong stock exchange Hacked Trading in Hong Kong was disrupted on Wednesday by a hacking incident on the Hong Kong Exchange website. " Our current assessment that this is a result of a malicious attack by outside hacking ," Charlies Li, chief executive of Hong Kong Exchanges & Clearing, told reporters. The seven stocks in question were all due to release sensitive results to the website that could impact the price of their stocks.Although the Hong Kong stock exchange also operates an alternative backup site for posting the results, it chose to halt trading of the affected stocks for the afternoon session.Stocks affected included HSBC, Cathay Pacific, China Power International and the Hong Kong exchange itself.It is unclear at this point whether the attack actually compromised the site, or if it was merely a denial of service attack. " It was the first time for a suspension due to such a kind of technical problem and one involving so many companies ,&
Hackers Get Hacked at #Defcon 19 Conference

Hackers Get Hacked at #Defcon 19 Conference

Aug 10, 2011
Hackers Get Hacked at # Defcon 19 Conference There are so many ways to get hacked at the world's largest hacker conference. A hacker could bump against your pocket with a card reader that steals your credit card information. Or a hacker might eavesdrop on your Internet traffic through an unsecured Wi-Fi network. Or a hacker might compromise your cell phone while you charge it in the hotel's public phone-charging kiosk. More than 10,000 hackers and security experts have descended upon the Rio Hotel and Casino in Las Vegas this weekend for three days of lectures and contests. A hacker with name Coderman claim about such an incident Happens at Rao Hotel Well by early Saturday morning a weapon was deployed in DefCon. Some characteristics of Hack Attack : - full active MitM against CDMA and 4G connections from Rio to carriers. - MitM positioning for remote exploitation to ring0 on Android and PC. - fall back to userspace only or non-persistent methods when persistent root kit unatt
#OpFacebook : Facebook will be down on November 5 by Anonymous Hackers Attack

#OpFacebook : Facebook will be down on November 5 by Anonymous Hackers Attack

Aug 10, 2011
#OpFacebook : Facebook will be down on November 5 by Anonymous Hackers Attack Anonymous has vowed to "destroy" Facebook on Nov. 5. Or more accurately, somebody has set up a Twitter account and YouTube channel to announce a plan dubbed "Operation Facebook." In a YouTube video, the hacking group warns, " Your medium of communication you all so dearly adore will be destroyed. " " If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill Facebook for the sake of your own privacy. " The group said in its message that "Operation Facebook" would be begin November 5. It claimed the social network, based in Palo Alto,Calif., provides information to "government agencies" so they can "spy on people." If Operation Facebook is real, it could mark a new phase for Anonymous, which in recent weeks has joined forces with the remnants of the more tightly knit hac
Indian Govt wants monitoring access for Twitter, Facebook,Skype and Google

Indian Govt wants monitoring access for Twitter, Facebook,Skype and Google

Aug 09, 2011
Indian Govt wants monitoring access for Twitter, Facebook,Skype and Google India's authorities are already forcing Research In Motion to grant access to the encrypted email and instant messages of its BlackBerry users, and now the government is pressuring Google and Skype too. Doesn't the government understand technology? Or, with new successes in the Indian economy, maybe the nation is feeling the need to flex a few muscles. India's communications ministry has been asked by the home ministry to monitor social networking websites such as Twitter and Facebook amid fears that the services are being used by terrorists to plan attacks. The request suggests that the Indian government is trying to broaden the scope of its online surveillance for national security. Telecommunications service providers in India provide facilities for lawful interception and monitoring of communications on their network, including communications from social networking websites such as Facebook
Cybersecurity Resources