The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: cybersecurity

Google to Encrypt Android Cloud Backups With Your Lock Screen Password

Google to Encrypt Android Cloud Backups With Your Lock Screen Password

October 14, 2018Swati Khandelwal
In an effort to secure users' data while maintaining privacy, Google has announced a new security measure for Android Backup Service...
Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities

Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities

October 09, 2018Swati Khandelwal
Microsoft has just released its latest monthly Patch Tuesday updates for October 2018, fixing a total of 49 security vulnerabilities in ...
Google Announces 5 Major Security Updates for Chrome Extensions

Google Announces 5 Major Security Updates for Chrome Extensions

October 02, 2018Mohit Kumar
Google has made several new announcements for its Chrome Web Store that aims at making Chrome extensions more secure and transparent to it...
Facebook Hacked — 10 Important Updates You Need To Know About

Facebook Hacked — 10 Important Updates You Need To Know About

September 28, 2018Swati Khandelwal
If you also found yourself logged out of Facebook on Friday, you are not alone. Facebook forced more than 90 million users to log out and ...
Google Hacker Discloses New Linux Kernel Vulnerability and PoC Exploit

Google Hacker Discloses New Linux Kernel Vulnerability and PoC Exploit

September 27, 2018Mohit Kumar
A cybersecurity researcher with Google Project Zero has released the details, and a proof-of-concept (PoC) exploit for a high severity vul...
16-Year-Old Boy Who Hacked Apple's Private Systems Gets No Jail Time

16-Year-Old Boy Who Hacked Apple's Private Systems Gets No Jail Time

September 27, 2018Swati Khandelwal
An Australian teenager who pleaded guilty to break into Apple's private systems  multiple times over several months and download some...
Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild

Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild

September 27, 2018Swati Khandelwal
Cybersecurity researchers at ESET have unveiled what they claim to be the first-ever UEFI rootkit being used in the wild, allowing hacker...
Linus Torvalds Apologizes For His Rude Behavior—Takes Time Off

Linus Torvalds Apologizes For His Rude Behavior—Takes Time Off

September 17, 2018Wang Wei
What just happened would definitely gonna surprise you. Linus Torvalds—father of the Linux open-source operating system—finally admitte...
Russia to Fine Search Engines for Linking to Banned VPN services

Russia to Fine Search Engines for Linking to Banned VPN services

June 09, 2018Mohit Kumar
In its years-long efforts to censor the Internet by blocking access to a large number of websites in the country, Russia has now approved...
Researchers Defeat AMD's SEV Virtual Machine Encryption

Researchers Defeat AMD's SEV Virtual Machine Encryption

May 27, 2018Mohit Kumar
German security researchers claim to have found a new practical attack against virtual machines (VMs) protected using AMD's Secure En...
Here's How to Download All the Data Apple Collects About You

Here's How to Download All the Data Apple Collects About You

May 24, 2018Swati Khandelwal
Apple is making it easier for its users to download their data the company has collected about them so far. On Wednesday, Apple just la...
The Hacker News Celebrates 7th Anniversary — Big Thanks 🥂 to Our Readers

The Hacker News Celebrates 7th Anniversary — Big Thanks 🥂 to Our Readers

November 01, 2017Mohit Kumar
The Hacker News (THN), the widely-read cybersecurity news source for hackers and technologists, is celebrating its 7th Anniversary today....
New IoT Bill Proposes Security Standards for Smart Devices

New IoT Bill Proposes Security Standards for Smart Devices

August 02, 2017Mohit Kumar
By this time, almost every one of you owns at least one internet-connected device—better known as the " Internet of things "—at...
NCIIPC: It's Time to Step Forward And Protect Our Critical Infrastructures from Cyber Attacks

NCIIPC: It's Time to Step Forward And Protect Our Critical Infrastructures from Cyber Attacks

January 26, 2017Mohit Kumar
The IT threat landscape has changed dramatically over the last three-four years. With no shortage of threat actors, from hacktivists to...
Cloud-AI: Artificially Intelligent System Found 10 Security Bugs in LinkedIn

Cloud-AI: Artificially Intelligent System Found 10 Security Bugs in LinkedIn

January 24, 2017Mohit Kumar
2017 is the year of Artificial Intelligence (A.I.), Big Data, Virtual Reality (VR) and Cyber Security with major companies like Google, F...
China Passes Cybersecurity Law to Tighten its Control over the Internet

China Passes Cybersecurity Law to Tighten its Control over the Internet

November 07, 2016Swati Khandelwal
China has long been known for its strict censorship policies, which has already made it difficult for foreign companies to do business in t...
Obama's Executive Order urges Companies to Share CyberSecurity Threat Data

Obama's Executive Order urges Companies to Share CyberSecurity Threat Data

February 15, 2015Mohit Kumar
President Barack Obama signed an executive order on Friday that encourages and promotes sharing of information on cybersecurity threats...
17-Year-Old Hanged Himself After Receiving Police Ransomware Threat Email

17-Year-Old Hanged Himself After Receiving Police Ransomware Threat Email

January 23, 2015Mohit Kumar
Ransomware  malware threat has forced somebody for the terrible suicide and once again has marked its history by somebody’s blood. Sad, but...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.