#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
AI Security

ethical hacking books | Breaking Cybersecurity News | The Hacker News

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Feb 24, 2011
Ankit Fadia ( Ethical Hacker and Cyber Security Expert ) is also Not Secure ! Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 11 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. Now the question raised that, is Mr. Ankit Fadia is Secured ? We have Notice that lots of Hackers from various countries are able to access his Site & Ftp , Even some of them are just only 15 years old. Last Days some images was uploaded on Facebook by some hackers, which shows that they access Ankit's Official Website and Ftp. Even they 'Root' The Server via uploading Shell . The guy who earn crores from Seminars ,is he can't audit his own security and can't afford a secure and
Microsoft accuses former manager of stealing 600 MB of confidential docs !

Microsoft accuses former manager of stealing 600 MB of confidential docs !

Feb 13, 2011
Microsoft yesterday accused a former manager of taking hundreds of megabytes of confidential company material when he left the firm for a new position at CRM rival Salesforce.com. In a motion filed with a Washington State Superior Court Thursday, Microsoft alleged that Matt Miszewski, formerly a market development manager in the company's government group, lied about retaining "a large trove of materials -- 600 megabytes of information comprising over 900 separate files (estimated at 25,000 pages)" of proprietary Microsoft information on his personal computer. Late last month, Microsoft sued Miszewski for violating non-compete and confidentiality agreements when he accepted a job as a senior vice president with customer-relationship management (CRM) vendor Salesforce.com. The state court then issued a temporary restraining order that blocked Miszewski from working at Salesforce.com, engaging in any competitive activities or providing services to any of his former cust
How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

Jul 22, 2024vCISO / Business Security
As a vCISO, you are responsible for your client's cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting. Recently, we published a comprehensive playbook for vCISOs, "Your First 100 Days as a vCISO – 5 Steps to Success" , which covers all the phases entailed in launching a successful vCISO engagement, along with recommended actions to take, and step-by-step examples.  Following the success of the playbook and the requests that have come in from the MSP/MSSP community, we decided to drill down into specific parts of vCISO reporting and provide more color and examples. In this article, we focus on how to create compelling narratives within a report, which has a significant impact on the overall MSP/MSSP value proposition.  This article brings the highlights of a recent guided workshop we held, covering what makes a successful report and how it can be used to enhance engagement with your cyber security clients.
Hackers Steal 100,000 E-mail !

Hackers Steal 100,000 E-mail !

Jan 21, 2011
Two attackers were more than 100,000 e-mail users Apple iPad, including politicians and famous journalists, federal prosecutors said Tuesday notifying the prosecution of men. AT & T has revealed a vulnerability of months ago, and U.S. Attorney Paul Fishman said there was evidence that the two men have used the information obtained for criminal purposes. Authorities warned, however, that information can be dissolved in the hands of spammers and scammers. Daniel Spitler, a guard from the library 26-year-old from San Francisco and Andrew Auernheimer, 25, of Fayetteville, Ark., is accused of fraud and conspiracy to access a computer without authorization. Fishman characterizes men and their cohorts that participation in a "malicious upsmanship, as they sought to impress others and others in the online community. "We do not tolerate crimes committed for street cred," said Fishman. "Hacking is not a competitive sport, and security breaches is not a game."
cyber security

Free OAuth Investigation Checklist - How to Uncover Risky or Malicious Grants

websiteNudge SecuritySaaS Security / Supply Chain
OAuth grants provide yet another way for attackers to compromise identities. Download our free checklist to learn what to look for and where when reviewing OAuth grants for potential risks.
Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t
UConn Co-op website hacked !

UConn Co-op website hacked !

Jan 12, 2011
Storrs : A computer hacker accessed the customer database of HuskyDirect.com, a website that sells sports paraphernalia from the UConn Co-op, prompting the store to order the vendor that manages the site to take it down. The Co-op announced Tuesday that it has notified law enforcement of the security breach and informed HuskyDirect.com customers whose billing information the database contained. Information that may have been exposed includes customer names, addresses, e-mail addresses and telephone numbers as well as credit card numbers, their expiration dates and security codes. The Co-op said it is arranging credit protection for the customers. The Co-op is investigating how many of the 18,000 accounts in the database were accessed. Customers who purchased items in the Co-op with a credit card were not affected, nor were students who purchased text books, or made purchases in person at a Co-op store or off-site location, the Co-op said. Only those customers who made purchases thro
Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Jan 12, 2011
Several members of a Korean crime gang were arrested this past Sunday (Jan. 9) for hiring hackers to launch distributed denial-of-service attacks (DDoS) against gaming sites owned by rival gangsters. The Korea Times reports four members of a crime gang based in Incheon, South Korea hired a hacker, identified only as Park, to launch DDoS attacks that would effectively prevent a rival gaming site from operating due to an overload of traffic. Police also arrested Lee, (who was identified only by the single moniker), the head of a computer server rental company for participating in the attacks. Park and Lee, who managed the Incheon-based gang's illegal gaming site, took down 109 rival websites between Nov. 21 and Dec. 15, 2010 by infecting them with malware for one to two hours a day, the report read. To further eliminate the competition, gang member Yoem put a 50,000-strong botnet of Chinese computers at Park and Lee's disposal. Often called "zombie" computers, botnets are a netwo
Cyber crime trail leads to Winona State students !

Cyber crime trail leads to Winona State students !

Jan 04, 2011
A U.S. Department of Homeland Security investigation dubbed "Operation eMule" has led federal agents to a pair of 22-year-old foreign-exchange students in Winona who are suspected to be part of a sophisticated cyber crime ring based in Vietnam that has been misusing the identities of countless Americans to bilk online retailers out of millions of dollars. "It's a big one," said Jason Calhoun, a fraud investigator with the Rosetta Stone language software company who has been working on the case with federal agents. Numerous major companies have been stung in the scam, including eBay, PayPal, Amazon, Apple, Dell and Verizon Wireless, according to federal court documents and Calhoun. Authorities say the operation is built around stolen identities that are used to open accounts with eBay, PayPal and U.S. banks. Through those accounts, the fraudsters sell popular, expensive merchandise at discounted prices. The sellers fill the orders by purchasing the goods from oth
Cybersecurity
Expert Insights
Cybersecurity Resources