The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: network hacking

Someone Hacked 50,000 Printers to Promote PewDiePie YouTube Channel

Someone Hacked 50,000 Printers to Promote PewDiePie YouTube Channel

November 30, 2018Mohit Kumar
This may sound crazy, but it’s true! The war for "most-subscribed Youtube channel" crown between T-Series and PewDiePie jus...
Dell Resets All Customers' Passwords After Potential Security Breach

Dell Resets All Customers' Passwords After Potential Security Breach

November 28, 2018Mohit Kumar
Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a "cybersecuri...
VPNFilter Router Malware Adds 7 New Network Exploitation Modules

VPNFilter Router Malware Adds 7 New Network Exploitation Modules

September 26, 2018Swati Khandelwal
Security researchers have discovered even more dangerous capabilities in VPNFilter —the highly sophisticated multi-stage malware that inf...
Hackers can compromise your network just by sending a Fax

Hackers can compromise your network just by sending a Fax

August 13, 2018Swati Khandelwal
What maximum a remote attacker can do just by having your Fax machine number? Believe it or not, but your fax number is literally enoug...
Researchers Uncover New Attacks Against LTE Network Protocol

Researchers Uncover New Attacks Against LTE Network Protocol

June 29, 2018Swati Khandelwal
If your mobile carrier offers LTE, also known as the 4G network, you need to beware as your network communication can be hijacked remotely. ...
Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

May 16, 2018Swati Khandelwal
Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer , which involves the exploitation a know...
New Rowhammer Attack Can Hijack Computers Remotely Over the Network

New Rowhammer Attack Can Hijack Computers Remotely Over the Network

May 10, 2018Mohit Kumar
Exploitation of Rowhammer attack just got easier. Dubbed ‘ Throwhammer ,’ the newly discovered technique could allow attackers to laun...
Man Who Hacked Jail Systems to Release His Friend Early Gets 7-Years in Prison

Man Who Hacked Jail Systems to Release His Friend Early Gets 7-Years in Prison

April 30, 2018Mohit Kumar
Remember a young hacker who hacked jail systems in an attempt to release his prison inmate early? Well, that hacker will now be joinin...
Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer

Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer

April 15, 2018Wang Wei
Internet-connected technology, also known as the Internet of Things (IoT), is now part of daily life, with smart assistants like Siri and...
CredSSP Flaw in Remote Desktop Protocol Affects All Versions of Windows

CredSSP Flaw in Remote Desktop Protocol Affects All Versions of Windows

March 13, 2018Mohit Kumar
A critical vulnerability has been discovered in Credential Security Support Provider protocol (CredSSP) that affects all versions of Wind...
New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam

New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam

March 05, 2018Swati Khandelwal
Security researchers have discovered a set of severe vulnerabilities in 4G LTE protocol that could be exploited to spy on user phone call...
Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager

Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager

October 30, 2017Swati Khandelwal
A highly critical vulnerability has been discovered in Oracle's enterprise identity management system that can be easily exploited by...
Here’s How Hackers Can Hijack Your Online Bitcoin Wallets

Here’s How Hackers Can Hijack Your Online Bitcoin Wallets

September 19, 2017Mohit Kumar
Researchers have been warning for years about critical issues with the Signaling System 7 (SS7) that could allow hackers to listen in priva...
Wikileaks Unveils 'Cherry Blossom' — Wireless Hacking System Used by CIA

Wikileaks Unveils 'Cherry Blossom' — Wireless Hacking System Used by CIA

June 15, 2017Swati Khandelwal
WikiLeaks has published a new batch of the ongoing Vault 7 leak , this time detailing a framework – which is being used by the CIA for mo...
This CIA Tool Hacks Windows Computers Silently Over the Network

This CIA Tool Hacks Windows Computers Silently Over the Network

June 01, 2017Mohit Kumar
WikiLeaks has published a new batch of the ongoing Vault 7 leak , this time detailing an alleged CIA project that allowed the agency to turn...
Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

September 07, 2016Wang Wei
A Security researcher has discovered a unique attack method that can be used to steal credentials from a locked computer ( but, logged-in ) ...
STOP Rule 41 — FBI should not get Legal Power to Hack Computers Worldwide

STOP Rule 41 — FBI should not get Legal Power to Hack Computers Worldwide

June 23, 2016Mohit Kumar
We have been hearing a lot about Rule 41 after the US Department of Justice has pushed an update to the rule. The change to the Rule 41...
Facebook Open Sources its Capture the Flag (CTF) Platform

Facebook Open Sources its Capture the Flag (CTF) Platform

May 11, 2016Mohit Kumar
Hacking into computer, networks and websites could easily land you in jail. But what if you could freely test and practice your hacking s...
Hackers Can Read Your Private SMS and Listen to Phone Calls

Hackers Can Read Your Private SMS and Listen to Phone Calls

December 19, 2014Swati Khandelwal
Security researchers have discovered a massive security flaw that could let hackers and cybercriminals listen to private phone calls and...
'The Home Depot' Data Breach Put 56 Million Payment Cards at Risk

'The Home Depot' Data Breach Put 56 Million Payment Cards at Risk

September 18, 2014Wang Wei
Home Depot , the nation’s largest home improvement retailer, announced on Thursday that a total of 56 million unique payment cards were ...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.