#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

Voice Of Hackers | Breaking Cybersecurity News | The Hacker News

Invitation for DEF-CON Chennai January Meet 2012 (DC602028)

Invitation for DEF-CON Chennai January Meet 2012 (DC602028)

Dec 04, 2011
Invitation for DEF-CON Chennai January Meet 2012 (DC602028) We like to invite all of you for our 4th meet which is going to held on 29th January 2012. DEF-CON Chennai is a registered group of DEF-CON, our group id is DC602028. [ Tickets for the Meet] For General Public : 700 INR For Students: 600 INR To book the tickets mail to dc602028@gmail.com [ Time of the Meet ] On 29th January 2012 From 2 PM to 7 PM Do make sure that your at the venue by 1:45 PM [ Venue of the Meet ] The Venue is going to be at Le Waterina Hotel, a 4 Star Resort. Le Waterina – The Boutique Hotel No 35 Kaveri Nagar (near Bella Ciao) Waterland Drive,Thiruvanmiyur Kottivakkam Beach.Chennai 600041. Refer: https://www.defcontn.com/DC602028/invitation-for-the-january-meet-2012/
The Spy Files: Wikileaks expose Mobile Phone, Email Hacking capability

The Spy Files: Wikileaks expose Mobile Phone, Email Hacking capability

Dec 01, 2011
The Spy Files: Wikileaks expose Mobile Phone, Email Hacking capability Wikileaks has released  ( https://spyfiles.org/ ) dozens of new documents highlighting the state of the once covert, but now lucrative private sector global surveillance industry. According to Assange, over 150 private sector organisations in 25 countries have the ability to not only track mobile devices, but also intercept messages and listen to calls also. Site founder Julian Assange has held a press conference, revealing the secrets of the industry.­ The whistleblowing site has published some 287 documents from its huge database, collected from 160 international intelligence contractors. The database includes internal documents of such companies like Gamma corporation in the UK, Ipoque of Germany, Amesys and Vupen in France, VASTech in South Africa, ZTE Corp in China, Phoenexia in the Czech Republic, SS8 and Blue Coat in the US, among others. From the press release: " The Wikileaks Spy Files reveal the de
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
The Hacker News (THN) 1st Anniversary Celebration

The Hacker News (THN) 1st Anniversary Celebration

Nov 01, 2011
The Hacker News (THN) 1st Anniversary Celebration It has been a wonderful "HACK" filled year as we disseminated security and hacking information around the world. We are grateful for our loyal readership and welcome new readers and contributors. Let's face it. Hacking isn't going away and growing security concerns are an issue we all need to stay on top of. Being informed about the latest and newest in security measures and the work of hackers to break into these means is a global issue with tremendous consequences. Hacking and security violations affect us all. Not only big corporations which store your information but the health and welfare of your personal PC's. The Hacker news has tracked the events of the last year and we are amazed and the talent and finesse of techy people who can break into the most complicated and sophisticated systems. You can depend on us for breaking news in the area of computer security. Keep reading and keep checking our daily web news. In c
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
Derbycon 2011 Videos talks

Derbycon 2011 Videos talks

Oct 04, 2011
Derbycon 2011 Videos Talks The idea behind DerbyCon was developed by Dave Kennedy (ReL1K), Martin Bos (PureHate), and Adrian Crenshaw (Irongeek). Their motivation stemmed from a desire to see more of the old-style talks and events of the conventions of the past. DerbyCon was hosted by some specialized two-day training courses from 30th Sep-2nd Oct 2011 in Louisville, Kentucky. DerbyCon isn't just another security conference. They have taken the best elements from all of the conferences. DerbyCon is a place you can call home, where you can meet each other, party, and learn. Their goal is to create a fun environment where the security community can come together to share ideas and concepts. Whether you know Linux, how to program, are established in security, or a hobbyist, the ideal of DerbyCon is to promote learning and strengthen the community. Day 1 Adrian, Dave, Martin: Welcome to DerbyCon 2011 – Intro to the con and events KEYNOTE ~ HD MOORE – Acoustic Intrusions Johnny Long
Contest Winners Announcement : Wireless Penetration Testing Guide book

Contest Winners Announcement : Wireless Penetration Testing Guide book

Oct 02, 2011
Contest Winners Announcement : Wireless Penetration Testing Guide book We ran a competition for the book " Backtrack 5 Wireless Penetration Testing " last week. Today, Vivek Ramachandran, the author of the book and Founder of SecurityTube.net is announcing the winners in the video below. We will be contacting the winners via email soon. Two Best Comments Selected by Author are : Scott Herbert : For me it's the "man-in-the middle" and other cutting edge wireless attacks that make it a book worth getting (even if I don't win). neutronkaos : What interests me most about this book is that it is dedicated to wireless hacking. In an age where almost everybody is rocking a wireless AP, this book could do alot in offense and defense. I have been a Backtrack fan since Backtrack 3 and I have seen several of Mr. Ramachandran's primers on security tube. I am currently deployed to Afghanistan and I am working towards a degree in Network Security. I would love to have this boo
Operation Satiagraha - Brazil Corruption Scandal exposed, #Antisec provide 5GB of evidence

Operation Satiagraha - Brazil Corruption Scandal exposed, #Antisec provide 5GB of evidence

Aug 12, 2011
Operation Satiagraha - Brazil Corruption Scandal exposed , #Antisec provide 5GB of evidence Once Again Pandora's box is open. In a joint move between LulzSec and Anonymous, as part of Operation Antisec, were released documents, photos, audio files and videos, exposing that wich was one of the greatest corruption scandals in the recent history of Brazil. In 2008, after four years of investigations, the Operation Satiagraha resulted in the arrest of several bankers, CFOs and investors, accused of corruption, misuse of public money, as well as money laundering. Antisec Hackers released a cache of evidence revealing government cover up of a corruption investigation involving the CIA, theBrazilian telecom industry, and multiple US corporations. The fact is that exposing so many powerful people, in both political and financial areas, Operation Satiagraha was eventually manipulated. Those who conducted the investigations were removed and habeas corpus were granted to the accused… A month a
Call for DEFCON Chennai (DC602028) 2011 meet on 14th August

Call for DEFCON Chennai (DC602028) 2011 meet on 14th August

Aug 08, 2011
Call for DEFCON Chennai (DC602028) 2011 meet on 14th August Welcome to DC602028 aka DEF-CON Chennai  DEFCON Chennai (DC602028) inviting all the like minded heads for the August 2011 meet In Chennai. Get Ready for Next Generation DefCon Meet.. -Where it 's taking place? Dazzle restaurant, Neelankarai Chennai. -At what time? From 4PM to 6PM. -Who will be the speaker ? There is no speaker, really. We dont have any speakers. It's going to be a Hacker meet, so we want each and everyone among us to share their little adventure. In other words "All are Speakers". -What are we going to talk about? Literally about everything on the "Hack Field". PS: We will be discussing about Exploits and Narcissism. - Will I get a Free foods, Drinks and hukka? Sorry due to recession, we are in recession. We advice you to have 300rs to 500rs ;-) - How can I contact DEF-CON Chennai? You can contact us at defchennai@gmail.com .  Please leave your name and phone nu
WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage !

WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage !

Jul 20, 2011
WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage ! With over 40+ HD videos containing 12+ hours of Wireless Ownage, this DVD weighs in at around 4.2 Gigabytes! SecurityTube.net just released a 4.2 GB DVD containing over 40+ HD quality videos of their WLAN Security Megaprimer. These videos run over 10+ hours and start from the very basics of wireless hacking, then slowly build momentum and eventually introduces you to the more advanced attacks and hacks. The videos are fully practical and every hack is demonstrated. They have voice over with detailed explanations of every attack thus allowing a genuine learner to understand, learn and practice, rather then providing just a quick guide to using ready made tools. We contacted SecurityTube and this initiative is part of larger program they are planning to provide free security and hacking education to everyone, especially students in developing countries like India. THN has always been an advocate of
Wikileaks - We help you safely Get the Truth !

Wikileaks - We help you safely Get the Truth !

Jun 25, 2011
Wikileaks - We help you safely Get the Truth ! Note : The Article is Taken from "The Hacker News Magazine" - June Edition. Download Magazine here .. The United States Department of Justice has left no stone unturned in their ruthless attempts to uncover or fabricate evidence against Wikileaks founder Julian Assange. Their goal is to charge Assange with conspiracy to commit espionage. If the United States is successful Julian Assange will become the United States convenient scapegoat, along with others like US citizen and Army Pvt. Bradley Manning. These two will disproportionately take the blame for the United States failed policies and crimes.  Julian Assange has said that the long and cruel detention and forthcoming US government prosecution of Army Pvt. Bradley Manning is nothing more than an attempt to "terrorize whistle-blowers" and that Pvt. Manning like himself is a victim of alleged government repression and mistreatment. "There is no doubt t
Interview with Anonymous ( Anony_ops OR Anon_Central )

Interview with Anonymous ( Anony_ops OR Anon_Central )

Jun 18, 2011
Interview with Anonymous ( Anony_ops OR Anon_Central ) Note : The Interview is taken from The Hacker News Magazine June Edition - Total Exposure .You can Download all THN Magazine editions from here . Anonymous is the political movement of change for the 21st century. Anonymous can and certainly will accomplish what many other political and peace movements of the past could not. When corruption, destruction and mayhem strikes from governments or corporations it is the goal of anonymous to awaken that entity and the public that a change must occur. We must understand that the Anonymous who strives for political change and world peace must be free to work without the mistrust and misdeeds of others who tarnish their good work. Anonymous is the gift we have been waiting for. Honest and trustworthy persons working hard on our behalf for the betterment of mankind.The Anonymous ,Need of  21st century, Let's Talk with Anony_ops ,Now known as Anon_Central on Twitter : THN : Who is Ry
Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03

Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03

Jun 06, 2011
Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03 The Hacker News ,June Month Magazine is Released Now ! GET YOUR COPY TODAY. Its our Issue 03 with theme " Total Exposure " . We hope this monthly magazine will keep you update in Cyber World. Content : - Total Exposure - Wikileaks : Exposure in true way - Guide about selecting your Computer Security Consultant - In the Realm of Cyber Breach - Exploit Writers : Challenging Cyber Security - Interview with Team Inj3ct0r - IT Security Incident Management - Interview with Core Anonymous Member : Anony_ops - Exposure of Password secrets of Apple Safari - Sony Hacked , Again hacked & Again Hacked - Hacking News Highlights of the Month - Hackers Toolkits Updates - Security Tool : Buffer Zone Download THN Magazine -- Rar File | PDF file (7.78 Mb) Also Get Previous Issue 01 & 02 here
Super Saturday : The Hacker News Featured Articles, If you miss Something !

Super Saturday : The Hacker News Featured Articles, If you miss Something !

May 14, 2011
Super Saturday :  The Hacker News Featured Articles, If you miss Something ! Let's Re-collect all the Featured Recent Interesting Articles of THN, in this post. Hope you Guys will like every news By us. Please share the Links on your Facebook/ Re-tweet on Twitter and everywhere to spread the Cyber Awareness :) The Anonymous : Need of  21st century ! 26 Underground Hacking Exploit Kits available for Download ! [THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue ! Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download ! Crimepack 3.1.3 Exploit kit Leaked, available for Download ! You got owned, Exposure about privacy on facebook ! Script that gives hackers access to user accounts floods Facebook Hacker getting WordPress Database Dump with Google Query ! Pakistan Cyber Army got hacked by Indian Cyber Army (Indishell) Facebook Security Update, Protection from Untrustworthy Websites With Web Of Trust (WOT) New Facebook worm propagating :
You got owned, Exposure about privacy on facebook !

You got owned, Exposure about privacy on facebook !

May 10, 2011
You got owned, Exposure about privacy on facebook ! If you had any doubts regarding privacy on facebook, here is a list containing hundreds of user and password, how can this be ? Easy, any application that asks for permission can get your credentials! And then do not say that we had not warned :P WikiLeaks founder Julian Assange says Facebook is Spying on You and Your Loved Ones "Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations and the communications with each other, their relatives, all sitting within the United States, all accessible to U.S. intelligence." Read More News Regarding Facebook on THN : Assange says Facebook is spying tool for US intelligence ! A Syrian Man-In-The-Middle Attack against Facebook Facebook is not Exclusion, XML Vulnerability ! Truth About Facebook -  CIA, U.S. government - Everything Related ! Vulnerability in Facebook Email feature Exposed ! Face
[THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue !

[THN] The Hacker News Exclusive Report on Sony 3rd Attack Issue !

May 08, 2011
[THN] The Hacker News Exclusive   Report on  Sony 3rd Attack Issue ! On May 5th 2011 THN received an email that Hackers once again attacked Sony for the 3rd Time. The Hacker News is a responsible an online Hacker News Organisation. We propagate news specifically related to security threats.  Also, hacking threads and security issues from all over the world.  We are NOT associated with any HACKING GROUP like ANONYMOUS or Others . Lets talk about the " 3rd Sony Hack Issue ". As I said, on 5th May we got the mail from a hacker  that they got some new Information from Sony's Site. Here the Email Screenshot : We check the links, that contains some waste list of user names , Even there is not a single email ID in whole excel sheet that can be used against some spam/hack. Then why Sony so Scared ?? Now WHAT? !!  Is  it our responsibility as The Hacker News , that we inform Sony and Other Cyber Security Experts that hackers can attack again, as they are searching for ne
'The Hacker News' Magazine - Social Engineering Edition - Issue 02 - May,2011 Released !

'The Hacker News' Magazine - Social Engineering Edition - Issue 02 - May,2011 Released !

May 05, 2011
' The Hacker News ' Magazine - Social Engineering Edition - Issue 02 - May,2011 Released ! We are happy to Announce that 'The Hacker News' [THN] Magazine Issue 02 (May 2011) is Out . This time we cover "Social Engineering Edition" . The Index of Content is as Given Below : Social Engineering  Opsony By Anonymous Anna Hazare - The Revolution in India Message By Pattie Galle Hacking News of Month Hackers Toolkit updates & Downloads Defacement News Security and Hacking Events of Month Cyber Crime News Linux News Security Updates Vulnerability Exposure Download THN Magazine - Social Engineering Edition : Click Here Note : You can Download all Other ISSUES of THN MAGAZINE from Here
Indian Revolution : Lets know about Anna Hazare !

Indian Revolution : Lets know about Anna Hazare !

Apr 08, 2011
Indian Revolution : Lets know about Anna Hazare ! " The dream of India as a strong nation will not be realised without self-reliant, self-sufficient villages, this can be achieved only through social commitment & involvement of the common man. " - Anna Hazare 1. Who is Anna Hazare? Started his career as a driver in the Army and turned into a social activist. 2. What's so special about him? He built a village Ralegaon Siddhi in Ahamad Nagar district, Maharashtra 3. So what? This village is a self-sustained model village. Energy is produced in the village itself from solar power, biofuel and wind mills. In 1975, it used to be a poverty clad village. Now it is one of the richest village in India. It has become a model for self-sustained, eco-friendly & harmonic village. 4. Ok,...? This guy, Anna Hazare was awarded Padma Bhushan and is a known figure for his social activities. 5. Really, what is he fighting for? He is supporting a cause, the amend
Vatican magazine says hackers do God’s work !

Vatican magazine says hackers do God's work !

Apr 07, 2011
Computer hackers embody classic Christian virtues, a Vatican publication says, and shouldn't be perceived negatively. In their passionate commitment to creating, and their openness to sharing ideas, hackers see their online exploits as "a form of participation in the 'work' of God in creation," Jesuit priest Father Antonio Spadaro wrote in the Vatican magazine Civilta Cattolica, Network World reported. Citing the "joyful application of intelligence to problem solving" they demonstrate, and their ingrained rejection of competition, profit and authority, Spadaro said hackers are aligned with the teachings of Christianity. "Under fire are control, competition, property," Spadaro said. It's a mindset, he said, that has "a clear theological origin." (However, citing technology writer Eric S. Raymond, Spadaro said hackers shouldn't be confused with "crackers"— the former builds things and the latter breaks them, Raymond wrote.) A small and ironic wrinkle in the godly hacker theory exis
Cybersecurity Resources