#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

ethical hacking books | Breaking Cybersecurity News | The Hacker News

Google Chrome Gets Updates: New Interfaces, Faster Browsing !

Google Chrome Gets Updates: New Interfaces, Faster Browsing !

Mar 09, 2011
Tuesday, Google announced a few changes to Chrome, its engineered-for-speed web browser. The super-fast beta version that was announced a few weeks ago has already been updated to a stable version. For the Googlers working on Chrome, speed entails not only faster code (the latest version of Chrome boasts a 66% improvement in JavaScript performance) but also easier-to-navigate interfaces. With that in mind, the company is rolling out a new Settings interface for all Chrome users. One major change is that Settings are now presented in a Chrome tab rather than a dialog box — a change that will seem familiar to those using Google's Cr-48 notebooks, which run Chrome OS and present absolutely everything in a browser tab. Settings are also searchable, which many users will likely find extremely helpful. Here's a brief demo video showing Chrome's new Settings pages in action: Google has also extended its sandboxing features to Chrome's Flash player. Interested parties can download
Anonymous : We have Revolution in mind, we can change the World !

Anonymous : We have Revolution in mind, we can change the World !

Mar 05, 2011
Anonymous : We have Revolution in mind , we can change the World ! We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us. — Anonymous They are Internet Heroes, hackers and hijackers, information rebels, revolutionaries and resisters. They are you, me, the grunt in the next cubicle, the geek who fixes your computer. They are Anonymous, an informal collective of  interactivists  that last month virtually armed protestors in Tunisia and Egypt with the necessary knowledge to topple governments: How to keep safe during protests. How to bypass censors. How not to leave an online trail. How to keep posting YouTubes when the dictators have pulled the Internet plug. One more very special lines I have written for Anonymous Hackers as below : We r Anonymous Hackers,bt we dnt Hack the Humanity.. We hate studies,Bt we love technology... World Can't Change Us,Bt We can CHANGE THE WORLD... We dnt have books in hand,Bt we have revolution in mind... We r the rarest com
Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Feb 24, 2011
Ankit Fadia ( Ethical Hacker and Cyber Security Expert ) is also Not Secure ! Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 11 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. Now the question raised that, is Mr. Ankit Fadia is Secured ? We have Notice that lots of Hackers from various countries are able to access his Site & Ftp , Even some of them are just only 15 years old. Last Days some images was uploaded on Facebook by some hackers, which shows that they access Ankit's Official Website and Ftp. Even they 'Root' The Server via uploading Shell . The guy who earn crores from Seminars ,is he can't audit his own security and can't afford a secure and
cyber security

Guide: Secure Your Privileged Access with Our Expert-Approved Template

websiteDelineaIT Security / Access Control Security
Transform your Privileged Access Management with our Policy Template—over 40 expertly crafted statements to elevate compliance and streamline your security.
New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

May 03, 2024SaaS Security / Browser Security
SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders need to address, since the existing security stack does not enable complete control or comprehensive monitoring of their usage. LayerX has recently released a new guide, " Let There Be Light: Eliminating the Risk of Shadow SaaS " for security and IT teams, which addresses this gap. The guide explains the challenges of shadow SaaS, i.e., the use of unauthorized SaaS apps for work purposes, and suggests practices and controls that can mitigate them. The guide also compares various security controls that attempt to address this risk (CASB, SASE, Secure Browser Extension) and explains how each one operates and its efficacy. Consequently, the guide is a must-read for all security leaders at modern organizations. Here are the main highlights:
Microsoft accuses former manager of stealing 600 MB of confidential docs !

Microsoft accuses former manager of stealing 600 MB of confidential docs !

Feb 13, 2011
Microsoft yesterday accused a former manager of taking hundreds of megabytes of confidential company material when he left the firm for a new position at CRM rival Salesforce.com. In a motion filed with a Washington State Superior Court Thursday, Microsoft alleged that Matt Miszewski, formerly a market development manager in the company's government group, lied about retaining "a large trove of materials -- 600 megabytes of information comprising over 900 separate files (estimated at 25,000 pages)" of proprietary Microsoft information on his personal computer. Late last month, Microsoft sued Miszewski for violating non-compete and confidentiality agreements when he accepted a job as a senior vice president with customer-relationship management (CRM) vendor Salesforce.com. The state court then issued a temporary restraining order that blocked Miszewski from working at Salesforce.com, engaging in any competitive activities or providing services to any of his former cust
Hackers Steal 100,000 E-mail !

Hackers Steal 100,000 E-mail !

Jan 21, 2011
Two attackers were more than 100,000 e-mail users Apple iPad, including politicians and famous journalists, federal prosecutors said Tuesday notifying the prosecution of men. AT & T has revealed a vulnerability of months ago, and U.S. Attorney Paul Fishman said there was evidence that the two men have used the information obtained for criminal purposes. Authorities warned, however, that information can be dissolved in the hands of spammers and scammers. Daniel Spitler, a guard from the library 26-year-old from San Francisco and Andrew Auernheimer, 25, of Fayetteville, Ark., is accused of fraud and conspiracy to access a computer without authorization. Fishman characterizes men and their cohorts that participation in a "malicious upsmanship, as they sought to impress others and others in the online community. "We do not tolerate crimes committed for street cred," said Fishman. "Hacking is not a competitive sport, and security breaches is not a game."
Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t
UConn Co-op website hacked !

UConn Co-op website hacked !

Jan 12, 2011
Storrs : A computer hacker accessed the customer database of HuskyDirect.com, a website that sells sports paraphernalia from the UConn Co-op, prompting the store to order the vendor that manages the site to take it down. The Co-op announced Tuesday that it has notified law enforcement of the security breach and informed HuskyDirect.com customers whose billing information the database contained. Information that may have been exposed includes customer names, addresses, e-mail addresses and telephone numbers as well as credit card numbers, their expiration dates and security codes. The Co-op said it is arranging credit protection for the customers. The Co-op is investigating how many of the 18,000 accounts in the database were accessed. Customers who purchased items in the Co-op with a credit card were not affected, nor were students who purchased text books, or made purchases in person at a Co-op store or off-site location, the Co-op said. Only those customers who made purchases thro
Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Jan 12, 2011
Several members of a Korean crime gang were arrested this past Sunday (Jan. 9) for hiring hackers to launch distributed denial-of-service attacks (DDoS) against gaming sites owned by rival gangsters. The Korea Times reports four members of a crime gang based in Incheon, South Korea hired a hacker, identified only as Park, to launch DDoS attacks that would effectively prevent a rival gaming site from operating due to an overload of traffic. Police also arrested Lee, (who was identified only by the single moniker), the head of a computer server rental company for participating in the attacks. Park and Lee, who managed the Incheon-based gang's illegal gaming site, took down 109 rival websites between Nov. 21 and Dec. 15, 2010 by infecting them with malware for one to two hours a day, the report read. To further eliminate the competition, gang member Yoem put a 50,000-strong botnet of Chinese computers at Park and Lee's disposal. Often called "zombie" computers, botnets are a netwo
Cyber crime trail leads to Winona State students !

Cyber crime trail leads to Winona State students !

Jan 04, 2011
A U.S. Department of Homeland Security investigation dubbed "Operation eMule" has led federal agents to a pair of 22-year-old foreign-exchange students in Winona who are suspected to be part of a sophisticated cyber crime ring based in Vietnam that has been misusing the identities of countless Americans to bilk online retailers out of millions of dollars. "It's a big one," said Jason Calhoun, a fraud investigator with the Rosetta Stone language software company who has been working on the case with federal agents. Numerous major companies have been stung in the scam, including eBay, PayPal, Amazon, Apple, Dell and Verizon Wireless, according to federal court documents and Calhoun. Authorities say the operation is built around stolen identities that are used to open accounts with eBay, PayPal and U.S. banks. Through those accounts, the fraudsters sell popular, expensive merchandise at discounted prices. The sellers fill the orders by purchasing the goods from oth
7 websites Defaced by Tunisian Hacker - H3rCuLe-32

7 websites Defaced by Tunisian Hacker - H3rCuLe-32

Dec 22, 2010
7 websites Defaced by Tunisian Hacker - H3rCuLe-32 Hacked Websites : https://www.99cent-ebooks.de/ https://myweddingdayplaza.nl/ https://www.goldfee.eu/ https://www.hopegames.com.br/ https://www.flash-electronics.r o/ https://www.pauchri.nl/ https://intertexplus.ru/
Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv

Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv

Dec 18, 2010
Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv Site : www.iran.tv They did not deface it because they had no permissions to upload file or delete the data or change details , but we made something more better and its to download all the users from the site (340 users) with passwords to emails,facebooks and more.. 
Introduction to Cyber Law of India !

Introduction to Cyber Law of India !

Dec 13, 2010
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. We can categorize Cyber crimes in two ways The Computer as a Target : -  Using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :- Using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws Technical Aspects Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as
Cybersecurity
Expert Insights
Cybersecurity Resources