#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

law advocates | Breaking Cybersecurity News | The Hacker News

Anonymous target USTelecom and TechAmerica for supporting Cybersecurity Bill

Anonymous target USTelecom and TechAmerica for supporting Cybersecurity Bill
Apr 10, 2012
Anonymous target USTelecom and TechAmerica for supporting Cybersecurity Bill Two technology trade associations said they were targeted by the hacker-activist group Anonymous as it singled out supporters of proposed legislation to improve U.S. cybersecurity. The hacker group Anonymous claimed responsibility for taking down the websites of USTelecom and Tech America, which both back the Cyber Intelligence Sharing and Protection Act of 2011. Both sites remained unreachable as of Monday afternoon. The attacks began yesterday when users were unable to log onto the sites. USTelecom represents telecom companies, including AT&T, Verizon, and CenturyLink; and TechAmerica's members include tech companies such as IBM, Microsoft, and Apple. A Twitter account called @Anon_Central yesterday called the Rogers bill " draconian " and posted a link to groups and companies supporting the legislation.[ See List here ] Anonymous posted a YouTube video showing USTelecom's site down S

U.S. Ambassador claim to be hacked by Russians

U.S. Ambassador claim to be hacked by Russians
Apr 01, 2012
U.S. Ambassador claim to be hacked by Russians Michael McFaul, the U.S. ambassador to Russia, took to Twitter Thursday night to accuse Russian media organization NTV of hacking his cell phone and email account. " I respect the right of the press to go anywhere & ask any question. But do they have a right to read my email and listen to my phone? " he tweeted this afternoon. when McFaul arrived for a meeting with the group For Human Rights today, reporters from state-owned NTV began peppering him with questions that kept him on the freezing street without a coat." Everywhere I go NTV is there. Wonder who gives them my calendar? They wouldn't tell me. Wonder what the laws are here for such things? " McFaul tweeted. Russian news agencies said NTV dismissed McFaul's complaint, and officials at the station, which is owned by Gazprom, the state-controlled monopoly, said they have a network of informants who provide them with information. Mr McFaul suggested the television reporters iden

Homeland Security have eye on Journalists

Homeland Security have eye on Journalists
Jan 11, 2012
Homeland Security have eye on Journalists The Department of Homeland Security has declared its intention to gather personal data on journalists or others who might use " traditional and/or social media in real time to keep their audience situationally aware and informed ". Well, it'll be interesting to see the reaction of Obama's adoring White House press corps when they discover their activities are being tracked by the Department of Homeland Security. Under the National Operations Center (NOC)'s Media Monitoring Initiative that came out of DHS headquarters in November, Washington has the written permission to retain data on users of social media and online networking platforms. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. The department says

Protecting Your Organization From Insider Threats - All You Need to Know

cyber security
websiteWing SecuritySaaS Security
Get practical insights and strategies to manage inadequate offboarding and insider risks effectively.

What's the Right EDR for You?

What's the Right EDR for You?
May 10, 2024Endpoint Security / Threat Detection
A guide to finding the right endpoint detection and response (EDR) solution for your business' unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint detection and response (EDR) solutions now serve as critical weapons in the fight, empowering you and your organization to detect known and unknown threats, respond to them quickly, and extend the cybersecurity fight across all phases of an attack.  With the growing need to defend your devices from today's cyber threats, however, choosing the right EDR solution can be a daunting task. There are so many options and features to choose from, and not all EDR solutions are made with everyday businesses and IT teams in mind. So how do you pick the best solution for your needs? Why EDR Is a Must Because of

Government organised 12 Chinese Hacker Groups behind all Attacks

Government organised 12 Chinese Hacker Groups behind all Attacks
Dec 13, 2011
Government organised 12 Chinese Hacker Groups  behind all Attacks About 12 different Chinese groups largely directed by the government there, do the bulk of the China based cyber attacks stealing critical data from U.S. companies and government agencies, according to U.S. cyber security analysts and experts. US online security companies are suggesting that it should have the right to force them to stop " by any means possible ". Sketched out by analysts who have worked with U.S. companies and the government on computer intrusions, the details illuminate recent claims by American intelligence officials about the escalating cyber threat emanating from China. And the widening expanse of targets, coupled with the expensive and sensitive technologies they are losing, is putting increased pressure on the U.S. to take a much harder stand against the communist giant. The report states that many of the attacks carry tell-tale signatures of particular hacking groups being tracked b

US satellites was victim by Chinese Hackers

US satellites was victim by Chinese Hackers
Oct 28, 2011
US satellites was victim by Chinese Hackers Computer hackers, possibly from the Chinese military, interfered with two U.S. government satellites four times in 2007 and 2008 through a ground station in Norway, according to a congressional commission. According to Bloomberg , the Chinese military is suspected of executing the digital intrusions which targeted satellites used for earth climate and terrain observation. Indeed, a Landsat-7 earth observation satellite system experienced 12 or more minutes of interference in October 2007 and July 2008, while hackers tapped into a Terra AM-1 earth observation satellite twice, for two minutes in June 2008 and nine minutes in October that year. Interestingly enough, the report doesn't actually accuse the Chinese government of sponsoring or executing the four attacks. 

 However, it clearly states that the breaches are "consistent" with Beijing's military doctrine which advocates disabling an enemy's space systems, and

Adobe Flash bug allow spying Webcam hole

Adobe Flash bug allow spying Webcam hole
Oct 20, 2011
Adobe Flash bug allow spying Webcam hole The flaw was disclosed in 2008 and can be exploited to turn on people's webcams or microphones without their knowledge. Attack involved putting the Adobe Flash Settings Manager page into an iFrame and masking it with a game, so that when the user clicked on the buttons he would actually change the settings and turn on the webcam. Adobe is working on a fix for a Flash Player vulnerability that can be exploited via clickjacking techniques to turn on people's webcams or microphones without their knowledge.The issue was discovered by a Stanford University computer science student named Feross Aboukhadijeh who based his proof-of-concept exploit on a similar one disclosed back in 2008 by an anonymous researcher. Once it was made public, Adobe fixed the issue by adding framebusting code to the Settings Manager page. But now, Stanford University computer science student Feross Aboukhadijeh managed to bypass the framebusting JavaScript co

India - US sign Cyber Shield deal

India - US sign Cyber Shield deal
Jul 20, 2011
India - US sign Cyber Shield deal India and the US on Tuesday inked a pact on cybersecurity to intensify information exchange on threats to computers and networks and initiate joint work on technologies against cyber-attacks. A joint statement on the India-US strategic dialogue has announced the cybersecurity agreement among new initiative by the two countries. These initiatives also include a plan to develop a software platform to make available non-sensitive government data to the public and to award $3 million each year to entrepreneurial projects that commercialise technologies to improve health. A memorandum of understanding between the Indian and the American Computer Emergency Response Teams (CERT) is expected to lead to routine exchange of information on vulnerabilities and co-operation on cybersecurity technologies, Indian CERT officials said. "This comes at a time when cybersecurity-related incidents are increasing in number and becoming more and more sophistic

WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage !

WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage !
Jul 20, 2011
WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage ! With over 40+ HD videos containing 12+ hours of Wireless Ownage, this DVD weighs in at around 4.2 Gigabytes! SecurityTube.net just released a 4.2 GB DVD containing over 40+ HD quality videos of their WLAN Security Megaprimer. These videos run over 10+ hours and start from the very basics of wireless hacking, then slowly build momentum and eventually introduces you to the more advanced attacks and hacks. The videos are fully practical and every hack is demonstrated. They have voice over with detailed explanations of every attack thus allowing a genuine learner to understand, learn and practice, rather then providing just a quick guide to using ready made tools. We contacted SecurityTube and this initiative is part of larger program they are planning to provide free security and hacking education to everyone, especially students in developing countries like India. THN has always been an advocate of

90,000 Military Email Accounts Leaked in Latest #AntiSec Attack

90,000 Military Email Accounts Leaked in Latest #AntiSec Attack
Jul 11, 2011
90,000 Military Email Accounts Leaked in Latest #AntiSec Attack In latest tweet by AnonymousIRC , Hackers leaks  90,000 Military Email Accounts from Booz Allen Hamilton is a massive American consulting firm for #AntiSec. Anonymous call it " Military Meltdown Monday: Mangling Booz Allen Hamilton " . The Leak include 90,000 logins of military personnel—including personnel from US CENTCOM, SOCOM, the Marine Corps, various Air Force facilities, Homeland Security, State Department staff, and what looks like private sector contractors. They Release it via Torrent of 130.5 MB archive file. Press Release by Anonymous is : Hello Thar! Today we want to turn our attention to Booz Allen Hamilton, whose core business  is contractual work completed on behalf of the US federal government, foremost  on defense and homeland security matters, and limited engagements of foreign  governments specific to U.S. military assistance programs. So in this line of work you'

Wikileaks - We help you safely Get the Truth !

Wikileaks - We help you safely Get the Truth !
Jun 25, 2011
Wikileaks - We help you safely Get the Truth ! Note : The Article is Taken from "The Hacker News Magazine" - June Edition. Download Magazine here .. The United States Department of Justice has left no stone unturned in their ruthless attempts to uncover or fabricate evidence against Wikileaks founder Julian Assange. Their goal is to charge Assange with conspiracy to commit espionage. If the United States is successful Julian Assange will become the United States convenient scapegoat, along with others like US citizen and Army Pvt. Bradley Manning. These two will disproportionately take the blame for the United States failed policies and crimes.  Julian Assange has said that the long and cruel detention and forthcoming US government prosecution of Army Pvt. Bradley Manning is nothing more than an attempt to "terrorize whistle-blowers" and that Pvt. Manning like himself is a victim of alleged government repression and mistreatment. "There is no doubt t

Lahore High court to Consider Permanent Ban on Facebook !

Lahore High court to Consider Permanent Ban on Facebook !
May 09, 2011
Lahore High court to Consider Permanent Ban on Facebook ! In Pakistan, blanket bans and censorship have been a regular feature. Since 2006, there have been instances where YouTube has been blocked, and more recently, Facebook. While the pretext is national security, the protection of Islam or the interest of the greater good, political motives have almost always been behind these acts. There were many critics of those lobbying against the ban on Facebook ban in May 2010, the constant criticism being: It's just a ban on Facebook, get over it. But actually, it wasn't "just a ban." It was about how we react to blasphemy, it was about the prevalent tendency to lynch others for what they say without hearing them out properly, without verifying, without giving second chances. It was about political appeasement, the use of religion for political purposes, and it was about the unconstitutional overstepping of authority by state institutions and departments. So it was not just about Faceboo

Bahrain calling Freedom and Democracy !

Bahrain calling Freedom and Democracy !
May 08, 2011
Bahrain calling Freedom and Democracy ! THN  received an Email last night, The mail was from one of the Citizens of Bahrain .. Here is the email we received is as following : You say you are helping people good, people of bahrain need your help All what we want is attacking government websites  By Anonymous group or any one To expose their crimes,and to expose Revealed lists of intelligence and mercenary of them, revealing lists of arrests two months ago Specifically February 14, at least 70% of the population of this country are demonstrating to demand democracy,but Were brutally suppressed by the local army and occupation forces from Saudi Arabia and United Arab Emirates,The called GCC Killed 30 citizens By a live bullets, 4 of them died in the prison Because of torture Political figures were arrested in addition to at least 2000 detainees from citizens,Arrested at least 100 women,Arrest medical staff of doctors, paramedics and nurses,Arrests of journalists,writers, poets, s
Expert Insights
Cybersecurity Resources