The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: email hacking

Apple iOS 7 Updates Silently Remove Encryption for Email Attachments

Apple iOS 7 Updates Silently Remove Encryption for Email Attachments

May 01, 2014Mohit Kumar
There is no question that Mobile devices have become a staple in everyday living around the world. But have you ever asked yourself, How Sec...
Worst Data Breach in German History, 18 Million Email Passwords Compromised

Worst Data Breach in German History, 18 Million Email Passwords Compromised

April 04, 2014Swati Khandelwal
Germany has confirmed its biggest Data theft in the country's history with usernames and passwords of some 18 million email accounts...
LinkedIn Hack Tool Exposes Users' Emails without Exploiting Any Vulnerability

LinkedIn Hack Tool Exposes Users' Emails without Exploiting Any Vulnerability

April 03, 2014Anonymous
A Free Chrome, Firefox and Safari web browser plugin floating around the web, called ' Sell Hack ' allows users to view the hidd...
Microsoft Admits Spying on Hotmail Account to track Source of Windows 8 leak

Microsoft Admits Spying on Hotmail Account to track Source of Windows 8 leak

March 21, 2014Mohit Kumar
Earlier this week, Microsoft admitted that they have accessed a French Blogger's private Hotmail account to identify a former Microsoft ...
Twitter enables StartTLS for Secure Emails to prevent Snooping

Twitter enables StartTLS for Secure Emails to prevent Snooping

March 14, 2014Wang Wei
TWITTER is taking users' privacy and security very seriously and in an effort to prevent Government snooping, the company has secure...
360 Million Stolen Credential FOR SALE on Underground Black Market

360 Million Stolen Credential FOR SALE on Underground Black Market

February 27, 2014Swati Khandelwal
Your Financial Credentials are on SALE on the Underground Black Market without your Knowledge… sounds like a nightmare, but it’s TRUE. ...
LinkedIn shutting down its security-plagued INTRO app in Early March

LinkedIn shutting down its security-plagued INTRO app in Early March

February 10, 2014Mohit Kumar
Last October, the social network ' LinkedIn ' launched a controversial Smartphone app called ' Intro ' that intercepts and r...
800,000 Customers' detail stolen in Data Breach at French Telecom 'Orange'

800,000 Customers' detail stolen in Data Breach at French Telecom 'Orange'

February 02, 2014Swati Khandelwal
One of the world’s largest mobile operator ' Orange ' has been hit by data breach. The French multinational telecommunicati...
Foursquare vulnerability that exposes 45 million users' email addresses

Foursquare vulnerability that exposes 45 million users' email addresses

January 27, 2014Mohit Kumar
A location based Social Networking platform with 45 million users,' Foursquare ' was vulnerable to the primary email address dis...
Mozilla Thunderbird vulnerability allows hackers to Insert malicious code into Emails

Mozilla Thunderbird vulnerability allows hackers to Insert malicious code into Emails

January 27, 2014Anonymous
Do you use Thunderbird , a free; open-source; cross-platform application for managing email and news feeds? According to a Pakistani Sec...
CBI arrests Indian mastermind behind Hire-a-Hacker service on FBI tip-off

CBI arrests Indian mastermind behind Hire-a-Hacker service on FBI tip-off

January 24, 2014Anonymous
For the first time in history, Indian Law Enforcement Agency 'Central Bureau of Investigation' (CBI) has arrested a Cyber crimin...
Infamous hacker "Guccifer" arrested in Romania; charged with multiple cyber crimes

Infamous hacker "Guccifer" arrested in Romania; charged with multiple cyber crimes

January 22, 2014Wang Wei
" Guccifer " arrested in Romania, the infamous hacker who was responsible for breaching the social media and email accounts of...
What Is PGP Encryption And How To Encrypt Your Emails

What Is PGP Encryption And How To Encrypt Your Emails

January 08, 2014Anonymous
Now that we have enough details about how the NSA's Surveillance program, running for a long time against almost each country of th...
Acoustic Cryptanalysis: Extracting RSA Key From GnuPG by capturing Computer Sound

Acoustic Cryptanalysis: Extracting RSA Key From GnuPG by capturing Computer Sound

December 20, 2013Mohit Kumar
' RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis ', is an interesting paper recently published by Three Israeli Securi...
Warning: 10 Million UK Users targeted with Cryptolocker Ransomware spam email campaign

Warning: 10 Million UK Users targeted with Cryptolocker Ransomware spam email campaign

November 17, 2013Wang Wei
The UK's National Crime Agency has given out an urgent national alert that a mass spamming event targeting 10 million UK based emai...
'LinkedIn Intro' iOS app can read your emails in iPhone

'LinkedIn Intro' iOS app can read your emails in iPhone

October 25, 2013Mohit Kumar
Your LinkedIn profile is your digital resume. Yesterday, LinkedIn launched a new app for for iOS devices called Intro ' LinkedIn In...
Fear of NSA PRISM : Indian Government may ban US email services for official communication

Fear of NSA PRISM : Indian Government may ban US email services for official communication

August 30, 2013Mohit Kumar
The Indian Government is planning to ban the use of US based email services like Gmail for official communications to increase the secur...
Telecom Italia Cookie Handling vulnerability allows hackers to hijack email accounts

Telecom Italia Cookie Handling vulnerability allows hackers to hijack email accounts

July 19, 2013Wang Wei
A cookie is a piece of data that is issued by a server in an HTTP response and stored for future use by the HTTP client. Quite simply, a...
Vulnerability in Facebook discloses Primary Email Address of any account

Vulnerability in Facebook discloses Primary Email Address of any account

July 09, 2013Mohit Kumar
When you sign up on Facebook, you have to enter an email address and that email address becomes your primary email address on Facebook. ...
Hacking DropBox account, Vulnerability allows hacker to bypass Two-Factor Authentication

Hacking DropBox account, Vulnerability allows hacker to bypass Two-Factor Authentication

July 05, 2013Mohit Kumar
Q-CERT team found a critical vulnerability that allows the attacker to bypass the two-factor authentication in the most popular file s...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.