#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

photos hacked | Breaking Cybersecurity News | The Hacker News

Category — photos hacked
It's Fappening Again! Private Photos of Emma Watson and Others Leaked Online

It's Fappening Again! Private Photos of Emma Watson and Others Leaked Online

Mar 16, 2017
Are you clicking selfies? That is fine and not any criminal act, but this act can land you in trouble — here's how! Almost three years after a wave of private photographs of celebrities leaked online, "The Fappening 2.0" appears to be underway with the circulation of alleged naked pictures of female celebrities, including Emma Watson and Amanda Seyfried on Reddit and 4chan. Back in 2014, anonymous hackers flooded the Internet with private photographs of major celebrities, including Jennifer Lawrence , Kim Kardashian , Kate Upton and Kirsten Dunst by hacking thousands of Apple's iCloud accounts . The Fappening hackers have since been sent to prison . The Fappening 2.0: It's Happening Again! However, in the latest leak, which has been heralded online as "The Fappening 2.0," the personal photographs of Amanda Seyfried and Emma Watson — ranging from regular selfies to explicitly sexual photos — have been leaking online since Tuesday night. ...
Hacker Exposes former US President Bush Family Photos and Emails

Hacker Exposes former US President Bush Family Photos and Emails

Feb 08, 2013
The hacker, known as Guccifer , targeted several e-mail accounts and exposed personal photos and sensitive correspondence from members of the former US President Bush family, including both former U.S. presidents. Hacked Emails includes the AOL account of his daughter Dorothy Bush Koch; family friends Willard Hemingway and Jim Nantz; former First Lady Barbara Bush's brother; and George H W Bush's sister-in-law. Some of the e-mails contain catty comments about another former president, Bill Clinton. The photos and e-mails were uploaded yesterday to an online account that appears to have been hacked for the purpose of hosting the material including confidential October 2012 list of home addresses, cell phone numbers, and e-mails for dozens of Bush family members, including both former presidents, their siblings, and their children. The hacker also intercepted photos that George W. Bush e-mailed two months ago to his sister showing paintings that he was working o...
5 Reasons Device Management Isn't Device Trust​

5 Reasons Device Management Isn't Device Trust​

Apr 21, 2025Endpoint Security / Zero Trust
The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on the threat landscape depicts the same picture.  The solution is more complex. For this article, we'll focus on the device threat vector. The risk they pose is significant, which is why device management tools like Mobile Device Management (MDM) and Endpoint Detection and Response (EDR) are essential components of an organization's security infrastructure. However, relying solely on these tools to manage device risk actually creates a false sense of security. Instead of the blunt tools of device management, organizations are looking for solutions that deliver device trust . Device trust provides a comprehensive, risk-based approach to device security enforcement, closing the large gaps left behind by traditional device management solutions. Here are 5 of those limitations and how to ov...
Expert Insights / Articles Videos
Cybersecurity Resources