#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Julian Assange | Breaking Cybersecurity News | The Hacker News

Anonymous Surpasses Wikileaks !

Anonymous Surpasses Wikileaks !

Feb 17, 2011
The exploits of Anonymous to hack the systems of firms providing spying services to governments and corporations suggest that the WikiLeaks mini-era has been surpassed. Much of WikiLeaks promise to protect sources is useless if the sources are not whistleblowers needing a forum for publication. Instead publishers of secret information grab it directly for posting to Torrent for anybody to access without mediation and mark-up by self-esteemed peddlers of protection, interpretationa and authentication, including media cum scholars. Ars Technica descriptions of the how the Anonymous hack are the best technical reading of Internet derring-do yet and far exceeds the much simpler rhetorical version of WikiLeaks security carefully bruited as if invulnerable but is not according to Daniel Domscheit-Berg's revelations. AnonLeaks.ru  is a remarkable advance of WikiLeaks. And promises much more by the same means and methods most associated with official spies -- NSA and CIA have long run
Ruling in Assange Extradition Case Expected Feb. 24,2011 !

Ruling in Assange Extradition Case Expected Feb. 24,2011 !

Feb 12, 2011
Final arguments in the extradition hearing of WikiLeaks founder Julian Assange were presented in a London court on Friday. The judge is expected to rule on February 24, but the case is likely to continue long afterward if either side files an appeal. Assange is being sought for questioning in Sweden on rape and coercion allegations stemming from sexual relations he had with two women in that country last August. One woman has claimed that Assange pinned her down to have sex with her and intentionally tore a condom he wore. The second woman claims that he had sex with her while she was initially asleep, failing to wear a condom despite repeated requests for him to do so. Assange has disputed their claims. Assange's attorneys have argued that Swedish prosecutor Marianne Ny had abused the Swedish and U.K. legal process by attempting to extradite Assange without charging him with a crime, and for alleged offenses that are not subject to extradition. They contradicted Ny's assertion that
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
Secret plan to kill Wikileaks with FUD leaked !

Secret plan to kill Wikileaks with FUD leaked !

Feb 10, 2011
Three security consulting firm with links to intelligence agencies of the United States to cook up to dirty tricks campaign late last year in favor of Wikileaks to destroy its perceived weaknesses, reads the draft published in the organization of information 'which claimed to be from the conspirators. Around December 3 was believed to be a consultant for defense contractors in the United States palantíri Technologies, Technology Berico HBGary and suggested lawyers desperate Bank of America union, which would ruin the site informants' uses a divide and conquer approach. The conspirators called a war of disinformation to "feed the confrontation between groups of fuel, which include a loss of false documents" call failed ", the creation of" concern for the safety of the infrastructure, "Wikileaks hackers to discover that respondents were to kill the project "and a media campaign to highlight the" radical and irresponsible nature of Wikileaks
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Is WikiLeaks Really Hacking for Secrets !

Is WikiLeaks Really Hacking for Secrets !

Feb 05, 2011
In April 2009 the whistle-blower website WikiLeaks appear a abstruse U.S. aggressive certificate account abstruse capabilities of the U.S. Navy's Pacific Missile Range Facility on Kauai. In an online column answer how it acquired the information, WikiLeaks adumbrated alone that it came from "a source." It was addition accomplishment for WikiLeaks and its founder, Julian Assange, who describes the extensive organization—it has no anchored domicile—as a defended agenda bead box for antagonistic insiders. He has again said WikiLeaks doesn't actively access classified abstracts but rather provides a belvedere for others who accept arcane advice to acknowledge for the attainable good. Except that WikiLeaks, according to Internet aegis aggregation Tiversa, appears to accept bolter bottomward that aggressive certificate itself. Tiversa says the accumulation may accept exploited a affection of file-sharing applications such as LimeWire and Kazaa that are generally acclimate
London Police Arrest Five Anonymous Hacker !

London Police Arrest Five Anonymous Hacker !

Jan 28, 2011
Month after allegedly assaulting various websites to defend Wikileaks London police may have caught members of "hacktivism" Anonymous group. Five alleged members were arrested in London today for Anonymous violation of the Computer Misuse Act. The men are aged 15 to 26 and face up to 10 years in prison and fines of £ 5,000. According to the website of the Metropolitan Police, reduce arrests from an ongoing study of the recent DDoS attacks which took place after the fallout from the arrest of Assange Wikileaks "Chief Julian. Different companies have refused to cough and the site Wikileaks is constantly blocked from its cable outlet in the United States ranked. In response sent a group of "hactivists" that anonymous calls, repeated attacks by opponents Wikileaks, including the likes of Visa, Mastercard, PayPal and Amazon, to varying success. Anonymous claims to be an organization without a leader, there is no hierarchy. Authorities around the world have st
Wikileaks said - No, We Do Not Hack The Icelandic Parliament !

Wikileaks said - No, We Do Not Hack The Icelandic Parliament !

Jan 25, 2011
Although some of the United States has accused the Wikileaks to steal data from peer-to-peer file-sharing, the second, was the guest of the payment to the surface in Iceland late last week: that the group informant in some a computer spy planted "in the Parliament building. A brief article in the Icelandic daily Morgunbladid law last Thursday reported that a mysterious PC was found in the Althing, the strengthening of the legislative capital of Reykjavik, in February last year. The team was in an empty room near the office of Birgitta Jonsdottir, a member of parliament who was appointed to the U.S. Department Justice probe of Wikileaks, despite the severance of ties with the group last summer. The newspaper reported that the police investigation has led to suspicions that the equipment was used for espionage, and, although no data or identity of the team gave no clues about its origins, Wikileaks was one of the suspects. Kristinn Icelandic Wikileaks Hrafnson categorically den
Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Jan 21, 2011
What is the future of political protest, as in a highly digitized world? We follow the real-time display via Wikileaks Cablegate. The day of the cables has been convicted for release in major newspapers worldwide, called a "political hack" cut the Wikileaks site with a distributed denial of service (DDoS). Later he wrote about Twitter that he went after the site for "attempting to give life to our troops and other assets." Wikileaks Swedish webhost moved the site owned by Amazon.com and Elastic Computing Cloud (EC2) in Ireland. When Senator Joseph Lieberman contact the hosting site, Amazon, Amazon Wikileaks to stop the service, citing terms of use. Then the free-for-all began. The pirates were involved, this time on behalf of Wikileaks, directed to Amazon. When PayPal froze payments to Wikileaks, the anonymous group of hackers, who organized the attacks on Amazon, focusing on reducing the site to pay online. When MasterCard announced that it would cease opera
Julian Assange's hacking offences revealed in Australian court documents !!

Julian Assange's hacking offences revealed in Australian court documents !!

Jan 19, 2011
IN 1991, using just a "simple, basic computer" from his home in suburban Melbourne, a young Julian Assange created a program that allowed him to access about 11,000 computers belonging to the giant Canadian telecommunications company Northern Telecom. New details of the WikiLeaks founder's early computer hacking-related offences have emerged in court documents released toThe Australian under an application to the Victorian County Court. The documents include a transcript of Mr Assange's 1996 pre-sentencing hearing for 24 computer-related offences, including accessing a server of Northern Telecom. While offering an insight into his unstable childhood, the documents also show the controversial website creator already displayed remarkable computer skills in his early adult life. In its submissions to County Court sentencing Judge Leslie Ross in December 1996, the prosecution described Mr Assange, then 25, as a far more sophisticated hacker than two other men char
Fine Gael website Hacked by Anonymous hackers !

Fine Gael website Hacked by Anonymous hackers !

Jan 11, 2011
Ireland's main opposition party confirms that the personal details of up to 2,000 people have been compromised by the attack Ireland's main opposition party's website has been hacked into by a group which has recently come to prominence for attacks on companies related to the WikiLeaks controversy. Up to 2,000 people's personal details were compromised in the attack by the hackers, known as Anonymous, Fine Gael said. The American internet firm ElectionMall, which reported the cyber attack to US authorities, has informed the party that the FBI is now involved in the investigation. A statement from Fine Gael confirmed that its site, Finegael.com had been compromised by the Anonymous group, which has backed WikiLeaks and its founder Julian Assange against attempts by the United States government to stop the leaking of sensitive American diplomatic cables. Anonymous has launched attacks on the websites of companies such as Visa, Mastercard and Amazon over allegations
U.S. investigators demand details about WikiLeaks' Twitter account from court !

U.S. investigators demand details about WikiLeaks' Twitter account from court !

Jan 09, 2011
U.S. investigators have gone to court to demand details about WikiLeaks' Twitter account, according to documents obtained Saturday -- the first revelation about the criminal case Washington is trying to build against those who leaked classified U.S. documents. The U.S. District Court for the Eastern District of Virginia issued a subpoena ordering Twitter Inc. to hand over private messages, billing information, telephone numbers, connection records and other information about accounts run by Assange and others. The subpoena also targeted Pfc. Bradley Manning, the U.S. Army intelligence analyst suspected of supplying the site with classified information; Birgitta Jonsdottir, an Icelandic parliamentarian and one-time WikiLeaks collaborator; and Dutch hacker Rop Gonggrijp and U.S. programmer Jacob Appelbaum, both of whom have worked with WikiLeaks in the past. The subpoena, dated Dec. 14, asked for information dating back to November 1, 2009. Assange blasted the U.S. move, saying
'Anonymous' Hacktivists Attack African Government Sites !

'Anonymous' Hacktivists Attack African Government Sites !

Jan 05, 2011
" Anonymous ," the shadowy hacktivist group that's attacked PayPal, the record industry and the Church of Scientology, has upped the ante: It's now taking on entire countries. The group launched massive distributed denial-of-service (DDoS) attacks on at least eight Tunisian government websites beginning Sunday night, according to Al Jazeera and the Internet security company Sophos. As of 4 p.m. EST Monday, the official Tunisian government website, www.tunisia.gov.tn , was still offline. Last Thursday, Anonymous launched similar attacks against websites operated by the government of Zimbabwe. Both attacks are part of " Operation Payback ," Anonymous' long-running campaign against organizations it feels are threatening Internet freedoms. Tunisia and Zimbabwe had blocked their citizens' access to Wikileaks last month, after secret U.S. State Department cables unflattering to either country were revealed as part of Julian Assange's huge dip
FBI raids ISP in Anonymous DDoS investigation !

FBI raids ISP in Anonymous DDoS investigation !

Jan 01, 2011
Authorities in the U.S. and Germany have raided Internet Service Providers in hopes of tracking down the hackers who launched distributed denial of service (DDoS) attacks against Web sites such as Visa.com, PayPal.com, and Mastercard.com earlier this month. In documents posted Wednesday to the Smoking Gun Web site, the U.S. Federal Bureau of Investigation describes the complex path its investigation has taken as it has searched for the computers that served as a central meeting point for the attacks. After Germany's Federal Criminal Police raided service provider Host Europe, they linked one of he IRC servers to Dallas's Tailor Made Services, the documents state. Two hard drives were seized from Dallas's Tailor Made Services on Dec. 16, the Smoking Gun reports. Another IRC server has been traced to Fremont, California's Hurricane Electric. Neither Hurricane Electric nor Tailor Made Services could be reached immediately for comment Thursday. The early-December at
Panda predicts malware creation and cyberwars will be key features of 2011 security landscape !

Panda predicts malware creation and cyberwars will be key features of 2011 security landscape !

Dec 31, 2011
In its 2011 IT security predictions, Panda Security is predicting that a further rising tide of malware, along with an online cyberwar plus cyberprotests, will be the order of the day as the year progresses. According to Luis Corrons, Panda's technical director, during 2010 we have seen a significant growth in the amount of malware, a constant theme over the last few years. "This year, more than 20 million new strains have been created, more than in 2009. At present, Panda's collective intelligence database stores a total of over 60 million classified threats. The actual rate of growth year-on-year however, appears to have peaked: some years ago it was over 100%. In 2010 it was 50%. We will have to wait and see what happens in 2011", he said in a security blog. Corrons added that, also during 2010, with Stuxnet and the WikiLeaks cables suggesting the involvement of the Chinese government in the cyberattacks on Google and other targets, a turning point in the hist
The ten biggest cyber security threats for 2011 !

The ten biggest cyber security threats for 2011 !

Dec 23, 2010
PandaLabs,  the antimalware laboratory of  Panda Security , the cloud security company, has forecasted several radical innovations in cyber-crime for 2011. Hacktivism and cyber-war; more profit-oriented malware; social media; social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year. There will also be an increase in the threats to Mac users, new efforts to attack 64-bit systems and zero-day exploits. Following is a summary of what PandaLabs predicts as the ten major security trends of 2011: 1. Malware creation:  In 2010, PandaLabs witnessed significant growth in the amount of malware and discovered at least 20 million new strains, more than in 2009. At present, Panda's Collective Intelligence database stores a total of more than 60 million classified threats. The actual rate of growth year-on-year however, appears to have peaked. Several years ago it was over 100 percent and in 2010 it was 50 percent. 2. Cyber w
Anonymous Hacktivists Promise More Attacks !

Anonymous Hacktivists Promise More Attacks !

Dec 20, 2010
A pro-WikiLeaks hacker says an Internet insurgent group will keep attacking companies that target the whistleblowing website. Speaking on camera for the first time, the cyber-insurgent "Bass" from the group Anonymous, revealed details of how they operate and their growing size. "Our pool of targets is actually very limited," the masked spokesman told Sky News. "We are going after the agencies that were directly involved in the censorship of WikiLeaks. "They include PayPal who cut off services and withheld funds. The same with Visa and MasterCard, then Amazon who cut off their service support. "We don't attack the media, that is a big no no. Even the media that has been critical of us, we don't attack any of the news," he said. "Facebook, Twitter and social network sites -- even though they have done some things against us we're not going to go after them." In the last attack the group said it mobilized 9,000 volunteer
Mastercard says,We're recovering from Wikileaks related attacks !

Mastercard says,We're recovering from Wikileaks related attacks !

Dec 14, 2010
Mastercard said Thursday that it is recovering from a series of attacks related to the Wikileaks flap. In a statement, Mastercard said: MasterCard has made significant progress in restoring full-service to its corporate website. Our core processing capabilities have not been compromised and cardholder account data has not been placed at risk. While we have seen limited interruption in some web-based services, cardholders can continue to use their cards for secure transactions globally. Hackers have taken aim at Mastercard in an effort dubbed " Operation Payback ." These attacks are aimed at any company that hampered the Wikileaks effort. Mastercard stopped processing donations for WikiLeaks. Amazon, who nixed Wikileaks' hosting, and PayPal are also on the hit list. These companies are now deemed enemies of Wikileaks leader Julian Assange, who is being held in the U.K. on accusations of sex offenses.
WikiLeaks Founder - Julian Assange : Evil Hacker or Visionary Hacker ?

WikiLeaks Founder - Julian Assange : Evil Hacker or Visionary Hacker ?

Dec 12, 2010
Who is Julian Paul Assange ? He is, of course, the lean, tall, and pale 39-year-old Australian master hacker at the white-hot center of the whistle-blowing website WikiLeaks and, after revealing thousands of secret Afghan battlefield reports this week, the subject of investigation by U.S. authorities. By now we've heard quite a bit about the Assange mystique and his cutesy-named website. WikiLeaks devotes itself to obtaining and posting secret government documents and information from unidentified sources. With WikiLeaks' heightened profile, stories about Assange have appeared recently in several publications, on TV, on the Internet, on cable, yet he remains one of the most elusive and enigmatic figures of the moment. Julian Paul Assange is an Australian journalist , publisher, and Internet activist . He is best known as the spokesperson and editor in chief for WikiLeaks, a whistleblower website. Before working with the website, he was a computer programmer . He has li
Cybersecurity Resources