The Hacker News — Most Popular Cyber Security, Hacking News Site: cyber security

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

August 09, 2018Mohit Kumar
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attac...
Apple Transfers Chinese Users' iCloud Data to State-Controlled Data Centers

Apple Transfers Chinese Users' iCloud Data to State-Controlled Data Centers

July 18, 2018Mohit Kumar
There's terrible news for Apple users in China. Apple's Chinese data center partner has transferred iCloud data, belonging to 13...
Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services

Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services

July 17, 2018Mohit Kumar
Microsoft today launched a new bug bounty program for bug hunters and researchers finding security vulnerabilities in its "identity s...
Free Thanatos Ransomware Decryption Tool Released

Free Thanatos Ransomware Decryption Tool Released

June 26, 2018Swati Khandelwal
If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or dec...
A New Paradigm For Cyber Threat Hunting

A New Paradigm For Cyber Threat Hunting

June 11, 2018Mohit Kumar
It’s no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are v...
Hackers are exploiting a new zero-day flaw in GPON routers

Hackers are exploiting a new zero-day flaw in GPON routers

May 22, 2018Mohit Kumar
Even after being aware of various active cyber attacks against the GPON Wi-Fi routers, if you haven't yet taken them off the Internet...
Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

May 22, 2018Mohit Kumar
Chinese security researchers have discovered more than a dozen vulnerabilities in the onboard compute units of BMW cars, some of which ca...
Critical Flaws in PGP and S/MIME Tools Can Reveal Encrypted Emails in Plaintext

Critical Flaws in PGP and S/MIME Tools Can Reveal Encrypted Emails in Plaintext

May 13, 2018Swati Khandelwal
Note— the technical details of the vulnerabilities introduced in this article has now been released, so you should also read our latest a...
Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?

Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?

May 09, 2018Mohit Kumar
Shortly after Microsoft announced support for custom JavaScript functions in Excel, someone demonstrated what could possibly go wrong if...
A Simple Tool Released to Protect Dasan GPON Routers from Remote Hacking

A Simple Tool Released to Protect Dasan GPON Routers from Remote Hacking

May 08, 2018Swati Khandelwal
Since hackers have started exploiting two recently disclosed unpatched critical vulnerabilities found in GPON home routers, security rese...
Hackers build a 'Master Key' that unlocks millions of Hotel rooms

Hackers build a 'Master Key' that unlocks millions of Hotel rooms

April 25, 2018Swati Khandelwal
If you often leave your valuable and expensive stuff like laptop and passports in the hotel rooms, then beware. Your room can be unlocked...
Facebook Plans to Build Its Own Chips For Hardware Devices

Facebook Plans to Build Its Own Chips For Hardware Devices

April 19, 2018Wang Wei
A new job opening post on Facebook suggests that the social network is forming a team to build its own hardware chips, joining other tech...
Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning

Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning

April 17, 2018Wang Wei
Global chip-maker Intel on Tuesday announced two new technologies—Threat Detection Technology (TDT) and Security Essentials—that not onl...
Facebook admits public data of its 2.2 billion users has been compromised

Facebook admits public data of its 2.2 billion users has been compromised

April 04, 2018Mohit Kumar
Facebook dropped another bombshell on its users by admitting that all of its 2.2 billion users should assume malicious third-party scrape...
Expedia Orbitz Travel, Flights, Hotel Booking Site Compromised

Expedia Orbitz Travel, Flights, Hotel Booking Site Compromised

March 20, 2018Wang Wei
Chicago-based online travel booking company Orbitz, a subsidiary of Expedia.com , reveals that one of its old websites has been hacked, ex...
Warning – 3 Popular VPN Services Are Leaking Your IP Address

Warning – 3 Popular VPN Services Are Leaking Your IP Address

March 15, 2018Mohit Kumar
Researchers found critical vulnerabilities in three popular VPN services that could leak users' real IP addresses and other sensitive...
Mac Software Mines Cryptocurrency in Exchange for Free Access to Premium Account

Mac Software Mines Cryptocurrency in Exchange for Free Access to Premium Account

March 12, 2018Mohit Kumar
Nothing comes for free, especially online. Would you be okay with allowing a few paid services to mine cryptocurrencies using your syst...
MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

March 12, 2018Mohit Kumar
The team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a...
Microsoft Issues Security Patch Update for 14 New Critical Vulnerabilities

Microsoft Issues Security Patch Update for 14 New Critical Vulnerabilities

February 13, 2018Mohit Kumar
Microsoft's Patch Tuesday for this month falls the day before the most romantic day of the year. Yes, it's Valentine's, and...