The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: hacking tool

Russia proposes 10 Year in Prison Sentence for Hackers and Malware Authors

Russia proposes 10 Year in Prison Sentence for Hackers and Malware Authors

December 08, 2016Mohit Kumar
The Russian government has introduced a draft bill that proposes prison sentences as punishment for hackers and cyber criminals creating ...
Shadow Brokers reveals list of Servers Hacked by the NSA

Shadow Brokers reveals list of Servers Hacked by the NSA

October 31, 2016Swati Khandelwal
The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking tools and explo...
Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

September 07, 2016Wang Wei
A Security researcher has discovered a unique attack method that can be used to steal credentials from a locked computer ( but, logged-in ) ...
Kali Linux 2016.2 — Download Latest Release Of Best Operating System For Hackers

Kali Linux 2016.2 — Download Latest Release Of Best Operating System For Hackers

September 02, 2016Swati Khandelwal
As promised at the Black Hat and Def Con security and hacking conferences, Offensive Security – the creators of Swiss army knife for rese...
Tonight Mr. Robot is Going to Reveal ‘Dream Device For Hackers’

Tonight Mr. Robot is Going to Reveal ‘Dream Device For Hackers’

August 31, 2016Mohit Kumar
Mr. Robot is the rare show that provides a realistic depiction of hacks and vulnerabilities that are at the forefront of cyber security....
Two US State Election Systems Hacked to Steal Voter Databases — FBI Warns

Two US State Election Systems Hacked to Steal Voter Databases — FBI Warns

August 29, 2016Mohit Kumar
A group of unknown hackers or an individual hacker may have breached voter registration databases for election systems in at least two US...
Leaked Exploits are Legit and Belong to NSA: Cisco, Fortinet and Snowden Docs Confirm

Leaked Exploits are Legit and Belong to NSA: Cisco, Fortinet and Snowden Docs Confirm

August 19, 2016Mohit Kumar
Last week, a group calling itself " The Shadow Brokers " published what it said was a set of NSA "cyber weapons," inc...
The NSA Hack — What, When, Where, How, Who & Why?

The NSA Hack — What, When, Where, How, Who & Why?

August 17, 2016Swati Khandelwal
You might have heard about the recent ongoing drama of NSA hack that has sparked a larger debate on the Internet concerning abilities of...
NSA's Hacking Group Hacked! Bunch of Private Hacking Tools Leaked Online

NSA's Hacking Group Hacked! Bunch of Private Hacking Tools Leaked Online

August 15, 2016Mohit Kumar
It seems like the NSA has been HACKED! Update: The NSA Hack — What, When, Where, How, Who & Why? Explained Here. An unknown hacke...
This Malware Can Secretly Auto-Install any Android App to Your Phone

This Malware Can Secretly Auto-Install any Android App to Your Phone

November 20, 2015Swati Khandelwal
Own an Android Smartphone? Hackers can install any malicious third-party app on your smartphone remotely even if you have clearly ta...
Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager

Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager

November 03, 2015Swati Khandelwal
Unless we are a human supercomputer, remembering a different password for every different site is not an easy task. But to solve thi...
How A Drone Can Infiltrate Your Network by Hovering Outside the Building

How A Drone Can Infiltrate Your Network by Hovering Outside the Building

October 06, 2015Swati Khandelwal
Imagine you are sitting in your office and working on something confidential. Once you are done, you send a command to print that docume...
Yahoo! Launches Free Web Application Security Scanner

Yahoo! Launches Free Web Application Security Scanner

September 25, 2015Swati Khandelwal
Yahoo! has open-sourced Gryffin – a Web Application Security Scanner – in an aim to improve the safety of the Web for everyone. Curr...
Hacking Team and Boeing Built Cyber Weaponized Drones to Spy on Targets

Hacking Team and Boeing Built Cyber Weaponized Drones to Spy on Targets

July 19, 2015Mohit Kumar
The leaked internal emails from the Italian surveillance software company Hacking Team have revealed that the spyware company developed...
Hacking Team Spyware preloaded with UEFI BIOS Rootkit to Hide Itself

Hacking Team Spyware preloaded with UEFI BIOS Rootkit to Hide Itself

July 14, 2015Mohit Kumar
Last Week someone just hacked the infamous Hacking Team , The Italy-based cyber weapons manufacturer and leaked a huge trove of 400GB in...
'Hacking Team' Gets Hacked! 500GB of Data Dumped Over the Internet

'Hacking Team' Gets Hacked! 500GB of Data Dumped Over the Internet

July 05, 2015Swati Khandelwal
Yes, sometimes even the Hackers get Hacked. Hacking Team , one of the most controversial spyware and malware providers to government...
[Video] PayPal Remote Code Execution Vulnerability Demonstrated by Hacker

[Video] PayPal Remote Code Execution Vulnerability Demonstrated by Hacker

April 28, 2015Wang Wei
A critical remote code execution vulnerability has been reported in the eBay owned global e-commerce business PayPal that could be explo...
Chinese Hackers Target Air-Gapped Networks in Southeast Asia

Chinese Hackers Target Air-Gapped Networks in Southeast Asia

April 13, 2015Swati Khandelwal
A State-sponsored Cyber Espionage Group -- most likely linked to the Chinese government becomes the first group to target the so-call...
New Cryptowall 3.0 Ransomware Communicates over I2P Anonymous Network

New Cryptowall 3.0 Ransomware Communicates over I2P Anonymous Network

January 14, 2015Swati Khandelwal
We have seen a series of Ransomware tended to be simple with dogged determinations to extort money from victims. But with the exponenti...
KeySweeper — Arduino-based Keylogger for Wireless Keyboards

KeySweeper — Arduino-based Keylogger for Wireless Keyboards

January 13, 2015Swati Khandelwal
Security researcher has developed a cheap USB wall charger that is capable to eavesdrop on almost any   Microsoft   wireless  keyboard...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.