The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security News: cybersecurity

WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone Users

WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone Users

September 16, 2019Mohit Kumar
Mistakenly sent a picture to someone via WhatsApp that you shouldn't have? Well, we've all been there, but what's more unfor...
Facebook Patches "Memory Disclosure Using JPEG Images" Flaws in HHVM Servers

Facebook Patches "Memory Disclosure Using JPEG Images" Flaws in HHVM Servers

September 09, 2019Wang Wei
Facebook has patched two high-severity vulnerabilities in its server application that could have allowed remote attackers to unauthorised...
Firefox 69 Now Blocks 3rd-Party Tracking Cookies and Cryptominers By Default

Firefox 69 Now Blocks 3rd-Party Tracking Cookies and Cryptominers By Default

September 04, 2019Swati Khandelwal
Mozilla has finally enabled the "Enhanced Tracking Protection" feature for all of its web browser users worldwide by default wi...
BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks

BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks

September 03, 2019Mohit Kumar
Enterprise servers powered by Supermicro motherboards can remotely be compromised by virtually plugging in malicious USB devices, cyberse...
Chinese Face-Swapping App ZAO Sparks Privacy Concerns After Going Crazily Viral

Chinese Face-Swapping App ZAO Sparks Privacy Concerns After Going Crazily Viral

September 03, 2019Swati Khandelwal
What could be more exciting than seeing yourself starring alongside your favorite actor in a movie, music video, or TV program? Yes, th...
Apple Changes the Way It Listens to Your Siri Recordings Following Privacy Concerns

Apple Changes the Way It Listens to Your Siri Recordings Following Privacy Concerns

August 29, 2019Swati Khandelwal
Apple today announced some major changes to its controversial 'Siri audio grading program' following criticism for employing huma...
French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

August 28, 2019Mohit Kumar
The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETAD...
Hacker Ordered to Pay Back Nearly £1 Million to Phishing Victims

Hacker Ordered to Pay Back Nearly £1 Million to Phishing Victims

August 23, 2019Wang Wei
A prolific hacker who carried out phishing scams against hundreds of companies worldwide has been ordered to pay back more than $1.1 mill...
How Activity Logs Help WordPress Admins Better Manage Website Security

How Activity Logs Help WordPress Admins Better Manage Website Security

August 20, 2019The Hacker News
Managing a WordPress website can sap a lot of your time and energy, which otherwise you'd spend on managing your business. If you'...
Bluetana App Quickly Detects Hidden Bluetooth Card Skimmers at Gas Pumps

Bluetana App Quickly Detects Hidden Bluetooth Card Skimmers at Gas Pumps

August 16, 2019Swati Khandelwal
In recent years, gas stations have become one of the favorite targets for thieves who are stealing customers' credit and debit card i...
Cerberus: A New Android 'Banking Malware For Rent' Emerges

Cerberus: A New Android 'Banking Malware For Rent' Emerges

August 13, 2019Swati Khandelwal
After a few popular Android Trojans like  Anubis ,  Red Alert 2.0 ,  GM bot , and Exobot, quit their malware-as-a-service businesses, a n...
Let Experts Do Their Job – Managed WAF by Indusface

Let Experts Do Their Job – Managed WAF by Indusface

August 13, 2019The Hacker News
WAF (Web Application Firewall) has been the first line of defence when it comes to application security for a while now. Many organizatio...
Engage Your Management with the Definitive 'Security for Management' Presentation Template

Engage Your Management with the Definitive 'Security for Management' Presentation Template

July 16, 2019The Hacker News
In every organization, there is a person who's directly accountable for cybersecurity. The name of the role varies per the organizati...
Cybersecurity Frameworks — Types, Strategies, Implementation and Benefits

Cybersecurity Frameworks — Types, Strategies, Implementation and Benefits

July 12, 2019Giridhara Raam
Organizations around the world are wondering how to become immune from cyber attacks which are evolving every day with more sophisticated...
5 Keys to Improve Your Cybersecurity

5 Keys to Improve Your Cybersecurity

June 18, 2019The Hacker News
Cybersecurity isn't easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity p...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.