#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

sell books | Breaking Cybersecurity News | The Hacker News

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Feb 24, 2011
Ankit Fadia ( Ethical Hacker and Cyber Security Expert ) is also Not Secure ! Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 11 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. Now the question raised that, is Mr. Ankit Fadia is Secured ? We have Notice that lots of Hackers from various countries are able to access his Site & Ftp , Even some of them are just only 15 years old. Last Days some images was uploaded on Facebook by some hackers, which shows that they access Ankit's Official Website and Ftp. Even they 'Root' The Server via uploading Shell . The guy who earn crores from Seminars ,is he can't audit his own security and can't afford a secure and
Microsoft accuses former manager of stealing 600 MB of confidential docs !

Microsoft accuses former manager of stealing 600 MB of confidential docs !

Feb 13, 2011
Microsoft yesterday accused a former manager of taking hundreds of megabytes of confidential company material when he left the firm for a new position at CRM rival Salesforce.com. In a motion filed with a Washington State Superior Court Thursday, Microsoft alleged that Matt Miszewski, formerly a market development manager in the company's government group, lied about retaining "a large trove of materials -- 600 megabytes of information comprising over 900 separate files (estimated at 25,000 pages)" of proprietary Microsoft information on his personal computer. Late last month, Microsoft sued Miszewski for violating non-compete and confidentiality agreements when he accepted a job as a senior vice president with customer-relationship management (CRM) vendor Salesforce.com. The state court then issued a temporary restraining order that blocked Miszewski from working at Salesforce.com, engaging in any competitive activities or providing services to any of his former cust
How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

Mar 21, 2024SaaS Security / Endpoint Security
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to the mix, the complexity and potential vulnerabilities within the  SaaS supply chain  snowball quickly. That's why effective vendor risk management (VRM) is a critical strategy in identifying, assessing, and mitigating risks to protect organizational assets and data integrity. Meanwhile, common approaches to vendor risk assessments are too slow and static for the modern world of SaaS. Most organizations have simply adapted their legacy evaluation techniques for on-premise software to apply to SaaS providers. This not only creates massive bottlenecks, but also causes organizations to inadvertently accept far too much risk. To effectively adapt to the realities of modern work, two major aspects need to change: the timeline of initial assessment must shorte
Hackers Steal 100,000 E-mail !

Hackers Steal 100,000 E-mail !

Jan 21, 2011
Two attackers were more than 100,000 e-mail users Apple iPad, including politicians and famous journalists, federal prosecutors said Tuesday notifying the prosecution of men. AT & T has revealed a vulnerability of months ago, and U.S. Attorney Paul Fishman said there was evidence that the two men have used the information obtained for criminal purposes. Authorities warned, however, that information can be dissolved in the hands of spammers and scammers. Daniel Spitler, a guard from the library 26-year-old from San Francisco and Andrew Auernheimer, 25, of Fayetteville, Ark., is accused of fraud and conspiracy to access a computer without authorization. Fishman characterizes men and their cohorts that participation in a "malicious upsmanship, as they sought to impress others and others in the online community. "We do not tolerate crimes committed for street cred," said Fishman. "Hacking is not a competitive sport, and security breaches is not a game."
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t
UConn Co-op website hacked !

UConn Co-op website hacked !

Jan 12, 2011
Storrs : A computer hacker accessed the customer database of HuskyDirect.com, a website that sells sports paraphernalia from the UConn Co-op, prompting the store to order the vendor that manages the site to take it down. The Co-op announced Tuesday that it has notified law enforcement of the security breach and informed HuskyDirect.com customers whose billing information the database contained. Information that may have been exposed includes customer names, addresses, e-mail addresses and telephone numbers as well as credit card numbers, their expiration dates and security codes. The Co-op said it is arranging credit protection for the customers. The Co-op is investigating how many of the 18,000 accounts in the database were accessed. Customers who purchased items in the Co-op with a credit card were not affected, nor were students who purchased text books, or made purchases in person at a Co-op store or off-site location, the Co-op said. Only those customers who made purchases thro
Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Cyber Gang War: Korean Crime Duo Nabbed for Web Attacks !

Jan 12, 2011
Several members of a Korean crime gang were arrested this past Sunday (Jan. 9) for hiring hackers to launch distributed denial-of-service attacks (DDoS) against gaming sites owned by rival gangsters. The Korea Times reports four members of a crime gang based in Incheon, South Korea hired a hacker, identified only as Park, to launch DDoS attacks that would effectively prevent a rival gaming site from operating due to an overload of traffic. Police also arrested Lee, (who was identified only by the single moniker), the head of a computer server rental company for participating in the attacks. Park and Lee, who managed the Incheon-based gang's illegal gaming site, took down 109 rival websites between Nov. 21 and Dec. 15, 2010 by infecting them with malware for one to two hours a day, the report read. To further eliminate the competition, gang member Yoem put a 50,000-strong botnet of Chinese computers at Park and Lee's disposal. Often called "zombie" computers, botnets are a netwo
Cyber crime trail leads to Winona State students !

Cyber crime trail leads to Winona State students !

Jan 04, 2011
A U.S. Department of Homeland Security investigation dubbed "Operation eMule" has led federal agents to a pair of 22-year-old foreign-exchange students in Winona who are suspected to be part of a sophisticated cyber crime ring based in Vietnam that has been misusing the identities of countless Americans to bilk online retailers out of millions of dollars. "It's a big one," said Jason Calhoun, a fraud investigator with the Rosetta Stone language software company who has been working on the case with federal agents. Numerous major companies have been stung in the scam, including eBay, PayPal, Amazon, Apple, Dell and Verizon Wireless, according to federal court documents and Calhoun. Authorities say the operation is built around stolen identities that are used to open accounts with eBay, PayPal and U.S. banks. Through those accounts, the fraudsters sell popular, expensive merchandise at discounted prices. The sellers fill the orders by purchasing the goods from oth
7 websites Defaced by Tunisian Hacker - H3rCuLe-32

7 websites Defaced by Tunisian Hacker - H3rCuLe-32

Dec 22, 2010
7 websites Defaced by Tunisian Hacker - H3rCuLe-32 Hacked Websites : https://www.99cent-ebooks.de/ https://myweddingdayplaza.nl/ https://www.goldfee.eu/ https://www.hopegames.com.br/ https://www.flash-electronics.r o/ https://www.pauchri.nl/ https://intertexplus.ru/
Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv

Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv

Dec 18, 2010
Nivosb ( Blue&White Team - Israel Hackers ) steal 340 users data from Iran.tv Site : www.iran.tv They did not deface it because they had no permissions to upload file or delete the data or change details , but we made something more better and its to download all the users from the site (340 users) with passwords to emails,facebooks and more.. 
Introduction to Cyber Law of India !

Introduction to Cyber Law of India !

Dec 13, 2010
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. We can categorize Cyber crimes in two ways The Computer as a Target : -  Using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :- Using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws Technical Aspects Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as
Google takes PC software fight to Mircrosoft's Windows !!

Google takes PC software fight to Mircrosoft's Windows !!

Dec 08, 2010
GOOGLE has made its most direct challenge to Microsoft with the launch of its new operating system that aims to defeat Windows. It is a battle for the future of personal computing. Users of computers running Chrome OS will be able to get online much more quickly as the system will turn on instantly and automatically log on to the web within seconds. In the first public demonstration of the software in San Francisco, Google showed that a user can be surfing the net within 60 seconds of switching on their computer. Chrome also brings users a step closer to being able to store all photographs, music and emails online rather than on a hard drive. The files would be kept in the "cloud" on the internet and be accessed from any device with an internet connection. Eric Schmidt, Google chief executive, said: "Cloud computing will define computing as we know it." The first computers running Chrome OS will be made by Acer and Samsung and
40 websites Hacked By AHG CreW

40 websites Hacked By AHG CreW

Dec 04, 2010
40 websites Hacked By AHG CreW Sites : www.arminashoes.nl www.samisecretgiftbaskets.com www.salekeyboard.com www.laurabonetti.com www.primedental.gr www.silkyhouse.gr www.swedishcare.gr www.symboulosbooks.gr www.jewellery2die4.com www.goodwinesonline.com www.shop.sunberrycoffee.com www.nevadahotwood.com www.zencha-tea.com www.mulberryst.tw www.holycowcoffeecompany.com www.velohive.com www.sunshinecommunication.com www.sunlighthydroponics.com www.suitid.com www.jolle-15.hu www.arminashoes.nl www.samisecretgiftbaskets.com www.salekeyboard.com www.laurabonetti.com www.primedental.gr www.silkyhouse.gr www.swedishcare.gr www.symboulosbooks.gr www.jewellery2die4.com www.goodwinesonline.com www.shop.sunberrycoffee.com www.nevadahotwood.com www.zencha-tea.com www.mulberryst.tw www.holycowcoffeecompany.com www.velohive.com www.sunshinecommunication.com www.sunlighthydroponics.com www.suitid.com www.arminashoes.nl  
CBI website hacked by 'Pakistani Cyber Army'

CBI website hacked by 'Pakistani Cyber Army'

Dec 04, 2010
In a major embarrassment, the website of premier investigating agency CBI was hacked tonight by programmers identifying themselves as "Pakistani Cyber Army". The home page of the CBI website had a message from the 'Pakistani Cyber Army' warning the Indian Cyber Army not to attack their . The hackers have made a mockery of the country's cyber security by infiltrating into the CBI website, supposed to be one of the most secure websites. The CBI is connected to the command centre of world police organisation - Interpol - 24x7. The message from the hackers also spoke about the filtering controls provided by the National Informatics Centre (NIC), a body which mans computer servers across the country. Intelligence agencies have been often warning the government that proper cyber security was not being ensured in government offices and that no security audit was being carried out. The Pakistani Cyber Army has also warned that it would carry out " mass defacemen
Professional Penetration Testing Guide

Professional Penetration Testing Guide

Nov 30, 2010
Here is the another good book in the field of penetration testing. Unlike other books which aims only at the technical aspects of Penetration testing, this one explains every step involved in the making of a Professional Pentester. Rather than just teaching how to use the existing tools,  it does more splendid job of showcasing the life cycle of pentester which starts with learning,  experimenting with own lab setup, live pen-testing and finally presenting the results in informative manner. Below is the 'Table of Contents' … Part I – Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6: Methodologies Chapter 7: PenTest Metrics Chapter 8: Management of a PenTest PartII – Running a PenTest Chapter 9: Information Gathering Chapter 10: Vulnerability Identification Chapter 11: Vulnerability Verification Chapter 12: Compromi
Fedora 14 with Cloud and Virtualization Features

Fedora 14 with Cloud and Virtualization Features

Nov 05, 2010
Fedora 14, or "Laughlin," made its official debut on Tuesday, and it's packed with a raft of new features designed to enhance the experience for users of the open source desktop operating system. Usability has been a key focus in the past few releases of Red Hat-sponsored Fedora, which is the second most popular Linux distribution, behind only Ubuntu, according to DistroWatch. Significant improvements in networking, software management, hardware support, and other functionality have resulted, so much of the work on this latest release has concentrated instead on providing bug fixes and increased stability. In addition to an improved desktop environment, however, Fedora 14 also features enhancements including "libjpegturbo," a library that brings noticeable performance improvements to users who load and save images in the popular JPEG format. The library "practically halves processing time on most systems," the software's makers say--even use
Cybersecurity Resources