#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Usa Hacker News | Breaking Cybersecurity News | The Hacker News

Free Gary McKinnon Campaign websites Hacked by TG ( TurkGuvenligi )

Free Gary McKinnon Campaign websites Hacked by TG ( TurkGuvenligi )

Aug 12, 2011
Free Gary McKinnon Campaign websites Hacked by TG ( TurkGuvenligi ) TG ( TurkGuvenligi ) today deface the websites of Free Gary McKinnon Campaign as shown. TG hacker is same who deface  Microsoft.com.br (Brasil)  some months before. Hacked Sites :  https://freegary.org.uk/ https://freegary.co.uk/ Mirror of Hack : https://zone-h.org/mirror/id/14649402 https://zone-h.org/mirror/id/14649399
Hackers Get Hacked at #Defcon 19 Conference

Hackers Get Hacked at #Defcon 19 Conference

Aug 10, 2011
Hackers Get Hacked at # Defcon 19 Conference There are so many ways to get hacked at the world's largest hacker conference. A hacker could bump against your pocket with a card reader that steals your credit card information. Or a hacker might eavesdrop on your Internet traffic through an unsecured Wi-Fi network. Or a hacker might compromise your cell phone while you charge it in the hotel's public phone-charging kiosk. More than 10,000 hackers and security experts have descended upon the Rio Hotel and Casino in Las Vegas this weekend for three days of lectures and contests. A hacker with name Coderman claim about such an incident Happens at Rao Hotel Well by early Saturday morning a weapon was deployed in DefCon. Some characteristics of Hack Attack : - full active MitM against CDMA and 4G connections from Rio to carriers. - MitM positioning for remote exploitation to ring0 on Android and PC. - fall back to userspace only or non-persistent methods when persistent root kit unatt
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
Sony Hiring Information Security Engineers & Facebook Hire George Hotz

Sony Hiring Information Security Engineers & Facebook Hire George Hotz

Jun 29, 2011
Sony Hiring Information Security Engineers After 14 Hacks, Finally Sony open  job recruitment for " Sr Application Security Analyst ". Sony Estimates 171 Million Dollar Loss due to PSN Hack. Also Sony CEO sorry for PSN hack, offers data theft insurance. Social network Facebook has hired a computer hacker who was recently sued by Sony for hacking the online game system PlayStation 3. Facebook did not reveal what 21-year-old George Hotz will do for the firm.  Hotz - also known by the alias "GeoHot" - gained notoriety in 2008 when he developed a software for unlocking the iPhone and allowing it to be used by other networks. He also released instructions on Sony PlayStation 3 that helped owners modify their consoles to run unauthorized applications and pirated games. It's been two months since the personal details of 100 million PSN and SOE users were stolen and Sony is still dealing with the fall-out. From SONY (Taleo): You will act as a Sr Informat
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
Th3J35t3r (The Jester) claim to expose identities of LulzSec Leader "Sabu"

Th3J35t3r (The Jester) claim to expose identities of LulzSec Leader "Sabu"

Jun 24, 2011
Th3J35t3r (The Jester) claim to expose identities of LulzSec Leader "Sabu" Th3J35t3r (The Jester) Just now Tweet " www.lulzsecurity.com - TANGO DOWN - 'this is General Hummel, from Alcatraz, Out' - https://t.co/oNm29Pv for the lulz. ". He doing ddos attack on Lulzsec website " www.lulzsecurity.com". and also he release a pastebin post, that includes some exposure about the Lulzsec leader "sabu". Some of the exposed info is: Name(s): Xavier Kaotico, Xavier de Leon Email: sabu@pure-elite.org, xavier@pure-elite.org, xavier@sentinix.org, xavier@tigerteam.se Age: 30 as of 2011-06-21 Location: Possibly New York City, NY (has lived there) Websites: sabu.net, pure-elite.org, confinement.org Profession: Independent IT consultant Interests: Python programming, Linux, network security, exploit development There are lots of Dox Information he posted in the pastebin :  https://pastebin.com/76TsPHeU  . There is Server Info
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

May 15, 2011
Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ? Over the past couple of weeks there has been a series of discussions around why the U.S defense and Intelligence agencies are moving so quickly to adopt cloud computing. Are there any Security Holes in their Security ? Or has someone already hacked them and their documents ?. In the last week we have noticed lots of hackers activity. If you have missed something then have a look to  Super Saturday : The Hacker News Featured Articles  ! Below you are going to read about Security Holes in the U.S defense and Intelligence agencies! A Hacker named " sl1nk " claims that he has: SSH access to a Network of 140 machine's layer 1 to 3 in the Pentagon Access to  APACS (automated personel air clearance system)  Thousand's of documents ranging from seizure of a vehicle up to private encryption key request forms. Database of all usernames/passwords of Webmail of Nasa. Access to ASSIST
FBI tracking hackers who targeting Vanessa Hudgens &other celebs !

FBI tracking hackers who targeting Vanessa Hudgens &other celebs !

Mar 18, 2011
The Federal Bureau of Investigation (FBI) is reportedly investigating a hacker ring that is targeting phones and computers of celebrities and stealing nude photos and other personal items. The probe stems from nude photos of Vanessa Hudgens that were recently leaked online, reports the New York Daily News.  According to TMZ.com, the federal investigators met Hudgens Wednesday to discuss her latest nude photo scandal and believe she might be the latest victim of a notorious hacker crew that has targeted scores of celebrities, including Scarlett Johansson, Ali Larter, Busy Philipps and Miley Cyrus. A source told the website that one ringleader had fingerprints on every job and the primary motivation appeared to be the thrill and challenge - not money. The new round of Hudgens' photos surfaced on the Internet Monday after similar full-frontal nudes appeared online in 2007 and 2009. Hudgens, 22, is seen kissing 'Zoey 101' actress Alexa Nikolas in one of the new photos. "
Times Square screens hacked using iPhone !

Times Square screens hacked using iPhone !

Mar 14, 2011
Times Square screens hacked using iPhone ! Hacker's Words : " The way it works is pretty simple: plug in my transmitter into the headphone minijack of an iphone 4 and play back any video clip. you can play it through the ipod feature or through the camera roll. the transmitter instantly sends the video signal to the video repeater and the video repeater overrides any video screen that it's being held next to. it doesn't matter what shape or size the hacked screen is because the hack video will simply keep its correct dimensions and the rest of the hacked space will stay black. i chose times square for my demo because it has lots of video screens to try it on. it is also one of the most monitored and secured areas in new york city and that made it that much more fun :). you can see in my video that the repeater is pretty powerful but the signal is not very stable yet. i'm working on that. i will post a new video later this week explaining how i made this pr
Stephen Fewer won Pwn2Own !

Stephen Fewer won Pwn2Own !

Mar 10, 2011
Stephen Fewer won Pwn2Own ! The annual Pwn2Own contest at the CanSecWest conference kicked off Wednesday and one of the winners this year was Stephen Fewer, who exploited Internet Explorer 8 on Windows 7. Dennis Fisher spoke with him about the contest, the challenge of attacking IE 8 and the utility of memory protections.
Secret plan to kill Wikileaks with FUD leaked !

Secret plan to kill Wikileaks with FUD leaked !

Feb 10, 2011
Three security consulting firm with links to intelligence agencies of the United States to cook up to dirty tricks campaign late last year in favor of Wikileaks to destroy its perceived weaknesses, reads the draft published in the organization of information 'which claimed to be from the conspirators. Around December 3 was believed to be a consultant for defense contractors in the United States palantíri Technologies, Technology Berico HBGary and suggested lawyers desperate Bank of America union, which would ruin the site informants' uses a divide and conquer approach. The conspirators called a war of disinformation to "feed the confrontation between groups of fuel, which include a loss of false documents" call failed ", the creation of" concern for the safety of the infrastructure, "Wikileaks hackers to discover that respondents were to kill the project "and a media campaign to highlight the" radical and irresponsible nature of Wikileaks
Facebook accounts of four Missouri state legislators hacked !

Facebook accounts of four Missouri state legislators hacked !

Feb 10, 2011
Internet hackers are targeting Missouri accompaniment assembly and their staff, and no one knows absolutely how or why. Since the aldermanic affair started Jan. 5, bristles bodies on the Abode ancillary of the Capitol accept appear their Facebook accounts actuality hacked: three Republican legislators, one Democratic administrator and one Republican staffer. It is the best concentrated, boundless adventurous of hacking contest the Abode has seen. "If the letters are true, this is a fasten in what we've accomplished in the past," said Adam Crumbliss, the Abode clerk. "We're audition added about it than we anytime have." Though no exact annual has been established, the instances of hacking point to a potentially broad computer aegis hole: A free, accessible wireless arrangement for Abode visitors and legislators serves as a basic acceptable mat for hackers, aegis experts say. Anniversary of the bristles contempo hacking victims had acclimated the arran
Infiltrate 2011 - Information security Event !

Infiltrate 2011 - Information security Event !

Feb 09, 2011
Infiltrate is a deep technical security conference that will focus entirely on offensive technical issues. It will be the single-most important event for those who are focused on the technical aspects of offensive security issues. No policy or high-level presentations, just hard-core thought provoking technical meat. World-renowned researchers focused on the latest technical issues will do the presentations – demonstrating techniques you can't learn about anywhere else. In order to keep Infiltrate accessible, we are limiting attendance to 100 attendees. In addition to two days of seminars, Immunity is also offering training both before and after the event. Both Immunity's most popular class "Unethical Hacking" and a new offering, the Immunity Master Class are available. This is the only venue where these classes are offered to the public. Event details Event: Infiltrate 2011 Date: 16 April-17 April 2011 Location: National Hotel in South Beach, Florida, USA. Organizer: Immunit
Anonymous attacks US security company !

Anonymous attacks US security company !

Feb 07, 2011
HBGary chief Aaron Barr's Twitter account hijacked and personal details leaked in revenge for infiltration of hacking collective The loose hacker collective Anonymous says it has taken revenge on aUS security company whose principal claimed to have penetrated the group and identified some of its key people. They hacked the Twitter account of Aaron Barr, the chief executive of HBGary, and sent out a series of angry tweets while many Americans were watching the Super Bowl match on Sunday night, allegedly including Barr's social security number and address, and his mobile phone number. The tweets link to torrents of the company's emails. Members of the group also put up a brutal set of claims: "Anonymous has: "entire control of all emails for the company of hbgary.com. we have full admin control of "hbgaryfederal.com. we have wordpress control of hbgary.com "all emails will be put up in a torrent. "full access to all their finincials &q
Gang stole credit card details of US Citizens !

Gang stole credit card details of US Citizens !

Feb 05, 2011
The cyber abomination badge arrested four youths, who had purchased cottony sarees account over Rs 17 lakh by application baseborn acclaim agenda capacity and agreement orders online. The youths, three of them engineers, had become accompany while alive in a arch alarm centre in the city. While one is a business graduate, the added three had marine, computer and civilian engineering degrees. The accused -- A Peter (29), V Kaviarasu (27) and SK Yuvaraj (27) Coimbatore and A Irfan (26) of Kolathur actuality were arrested by the cyber abomination addition badge absorbed to the Central Abomination Branch (CCB) on Friday and adjourned in administrative custody. The four had purchased cottony sarees account Rs 17.8 lakh and awash them to a few bounded shops at a cheaper price. Irfan and Yuvaraj were incharge of auction of the baseborn goods. Based on the complaint of Kumarasamy, who is a accepted administrator in a arch bolt exhibit in T Nagar, the cyber abomination badge tracked the a
US recruiting young cyber warriors !

US recruiting young cyber warriors !

Feb 02, 2011
The United States is attractive for the abutting bearing of cyber warriors. The US Cyber Challenge Cyber Foundations competition, kicked off this anniversary by the nonprofit Centermost for Internet Aegis , is out to acquisition 10,000 acceptance with the abeyant to become "top accoutrements in cybersecurity." "The charge to acquisition artistic solutions to attention our advice systems and agenda basement has never been greater," said centermost arch controlling William Pelgrin. "The Cyber Foundations antagonism will advice us tap into the amazing aptitude beyond our nation's schools to analyze those with a affection for aegis and a admiration to put their abilities to acceptable use," he continued. The antagonism consists of a alternation of timed quizzes to analysis aerial academy acceptance in computer science categories advised key to attention networks and systems. Top-scoring acceptance will get status, prizes, and introductions to gov
FBI raids on 40 Anonymous hackers !

FBI raids on 40 Anonymous hackers !

Feb 01, 2011
The FBI would have conducted 40 raids yesterday and seized the computers of members of the loosely organized group of hackers known as Anonymous. Several members have posted their stories in online forums, including images of kicking in doors. The FBI has seized every computer in every house and other electronic devices such as game consoles and iPhones. The reports may be exaggerated, but the FBI has issued 40 orders in the case. The FBI was gathering evidence on the group's refusal of service attacks against Visa, MasterCard, PayPal and Amazon. The group has launched attacks in retaliation for actions against Wikileaks site, which has published thousands of documents from the United States filed in December. Denial of service attacks are frustrating for victims and may also cause real economic damage. They are also against the law and raids. But Anonyme allegedly political reasons in the raid. The group said in a press statement that the denial of service attacks have bee
Government Sites, Military And Educational For Sale By Hackers !!

Government Sites, Military And Educational For Sale By Hackers !!

Jan 27, 2011
A hacker has a number of sites belonging to government agencies, military and educational for sale on internet forums. The discovery was made by Noa Bar-Yosef, a senior security strategist at security vendor Imperva. Bar-Yosef, wrote about it in the company's blog last Friday, noting that prices range from $ 33 from $ 499. In addition, personally identifiable information obtained by the infiltrators sites has also been sold for about $ 20 billion records. Although details of the written Imperva screenshots shown as evidence, security blogger Brian Krebs has published additional information indicating the websites that belong to the states of Utah and Michigan as available for sale, including the site belonging U.S. Communications Army-Electronics Command (CECOM), which is the cyber army unit. The heart of the matter is how web servers poorly supported or corrected may be vulnerable to attacks, regardless of their size (or size) of their own organization. I did a quick check, a
You Have $ 500? You Can Buy A Hack For The Site Of U.S. Army !

You Have $ 500? You Can Buy A Hack For The Site Of U.S. Army !

Jan 22, 2011
If you are a criminal looking for total control of the World Wide Web, used by the U.S. Army Communications-Electronics Command (CECOM), you can get it for just under $ 500 U.S. Or so we offer underground hackers in the forums. security provider Imperva found on the black market sales pitch on Thursday and published details of the incident on Friday. Hacker says that oversees several sites, including other military sites, government sites, and belong to universities, "said Noa Bar-Yosef, Imperva senior security strategist. Prices range from $ 33 and $ 499, depending on how important site or widely used. "You can actually acquire the ability to have a web site administrator," he said. The hacker also sells its database of personal data was stolen, sites $ 20 per thousand records, "he said. This information could be used by spammers or scam artists to penetrate accounts online. Bar-Yosef saw that the administrative privileges of the 16 sites were available fo
Man places 2nd in national computer hacking competition

Man places 2nd in national computer hacking competition

Oct 30, 2010
BAKERSFIELD, Calif -- In many ways Matt Bergin is your typical 21-year-old guy. During the day he works as a sales representative for a local grape exporter. But at night he's anything but typical. Bergin spends countless hours on his computer working to hack into network systems. Over the past few months Bergin has clicked and typed his way through some of the most sophisticated software businesses have to offer. It's a skill some in Washington D.C. noticed quickly, earning him a trip to the U.S. Cyber Challenge; an event put on by the White House and U.S. Navy. Users played on a game called 'Netwars.' It's designed to detect bright brains like Bergin's. Bergin took 2nd place in the daylong competition and since then, he has been offered positions with two security companies.
Cybersecurity Resources