#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

ethical hacking books | Breaking Cybersecurity News | The Hacker News

Category — ethical hacking books
Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Feb 24, 2011
Ankit Fadia ( Ethical Hacker and Cyber Security Expert ) is also Not Secure ! Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 11 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. Now the question raised that, is Mr. Ankit Fadia is Secured ? We have Notice that lots of Hackers from various countries are able to access his Site & Ftp , Even some of them are just only 15 years old. Last Days some images was uploaded on Facebook by some hackers, which shows that they access Ankit's Official Website and Ftp. Even they 'Root' The Server via uploading Shell . The guy who earn crores from Seminars ,is he can't audit his own security and can't afford a secure and...
Microsoft accuses former manager of stealing 600 MB of confidential docs !

Microsoft accuses former manager of stealing 600 MB of confidential docs !

Feb 13, 2011
Microsoft yesterday accused a former manager of taking hundreds of megabytes of confidential company material when he left the firm for a new position at CRM rival Salesforce.com. In a motion filed with a Washington State Superior Court Thursday, Microsoft alleged that Matt Miszewski, formerly a market development manager in the company's government group, lied about retaining "a large trove of materials -- 600 megabytes of information comprising over 900 separate files (estimated at 25,000 pages)" of proprietary Microsoft information on his personal computer. Late last month, Microsoft sued Miszewski for violating non-compete and confidentiality agreements when he accepted a job as a senior vice president with customer-relationship management (CRM) vendor Salesforce.com. The state court then issued a temporary restraining order that blocked Miszewski from working at Salesforce.com, engaging in any competitive activities or providing services to any of his former cust...
Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?

Crowdstrike Named A Leader In Endpoint Protection Platforms

Nov 22, 2024Endpoint Security / Threat Detection
CrowdStrike is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms for the fifth consecutive time, positioned highest on Ability to Execute and furthest to the right on Completeness of Vision.
Hackers Steal 100,000 E-mail !

Hackers Steal 100,000 E-mail !

Jan 21, 2011
Two attackers were more than 100,000 e-mail users Apple iPad, including politicians and famous journalists, federal prosecutors said Tuesday notifying the prosecution of men. AT & T has revealed a vulnerability of months ago, and U.S. Attorney Paul Fishman said there was evidence that the two men have used the information obtained for criminal purposes. Authorities warned, however, that information can be dissolved in the hands of spammers and scammers. Daniel Spitler, a guard from the library 26-year-old from San Francisco and Andrew Auernheimer, 25, of Fayetteville, Ark., is accused of fraud and conspiracy to access a computer without authorization. Fishman characterizes men and their cohorts that participation in a "malicious upsmanship, as they sought to impress others and others in the online community. "We do not tolerate crimes committed for street cred," said Fishman. "Hacking is not a competitive sport, and security breaches is not a game....
cyber security

Creating, Managing and Securing Non-Human Identities

websitePermisoCybersecurity / Identity Security
A new class of identities has emerged alongside traditional human users: non-human identities (NHIs). Permiso Security's new eBook details everything you need to know about managing and securing non-human identities, and strategies to unify identity security without compromising agility.
Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t...
UConn Co-op website hacked !

UConn Co-op website hacked !

Jan 12, 2011
Storrs : A computer hacker accessed the customer database of HuskyDirect.com, a website that sells sports paraphernalia from the UConn Co-op, prompting the store to order the vendor that manages the site to take it down. The Co-op announced Tuesday that it has notified law enforcement of the security breach and informed HuskyDirect.com customers whose billing information the database contained. Information that may have been exposed includes customer names, addresses, e-mail addresses and telephone numbers as well as credit card numbers, their expiration dates and security codes. The Co-op said it is arranging credit protection for the customers. The Co-op is investigating how many of the 18,000 accounts in the database were accessed. Customers who purchased items in the Co-op with a credit card were not affected, nor were students who purchased text books, or made purchases in person at a Co-op store or off-site location, the Co-op said. Only those customers who made purchases thro...
Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Jan 12, 2011
Several members of a Korean crime gang were arrested this past Sunday (Jan. 9) for hiring hackers to launch distributed denial-of-service attacks (DDoS) against gaming sites owned by rival gangsters. The Korea Times reports four members of a crime gang based in Incheon, South Korea hired a hacker, identified only as Park, to launch DDoS attacks that would effectively prevent a rival gaming site from operating due to an overload of traffic. Police also arrested Lee, (who was identified only by the single moniker), the head of a computer server rental company for participating in the attacks. Park and Lee, who managed the Incheon-based gang's illegal gaming site, took down 109 rival websites between Nov. 21 and Dec. 15, 2010 by infecting them with malware for one to two hours a day, the report read. To further eliminate the competition, gang member Yoem put a 50,000-strong botnet of Chinese computers at Park and Lee's disposal. Often called "zombie" computers, botnets are a netwo...
Cyber crime trail leads to Winona State students !

Cyber crime trail leads to Winona State students !

Jan 04, 2011
A U.S. Department of Homeland Security investigation dubbed "Operation eMule" has led federal agents to a pair of 22-year-old foreign-exchange students in Winona who are suspected to be part of a sophisticated cyber crime ring based in Vietnam that has been misusing the identities of countless Americans to bilk online retailers out of millions of dollars. "It's a big one," said Jason Calhoun, a fraud investigator with the Rosetta Stone language software company who has been working on the case with federal agents. Numerous major companies have been stung in the scam, including eBay, PayPal, Amazon, Apple, Dell and Verizon Wireless, according to federal court documents and Calhoun. Authorities say the operation is built around stolen identities that are used to open accounts with eBay, PayPal and U.S. banks. Through those accounts, the fraudsters sell popular, expensive merchandise at discounted prices. The sellers fill the orders by purchasing the goods from oth...
Expert Insights / Articles Videos
Cybersecurity Resources