The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: social engineering

President Trump's @POTUS Twitter Linked To A Private Gmail Account

President Trump's @POTUS Twitter Linked To A Private Gmail Account

January 26, 2017Mohit Kumar
It seems like the new American President's Twitter account could easily be hacked due to security blunders he made with the most powe...
'The Fappening' Hacker Reveals How He Stole Nude Pics of Over 100 Celebrities

'The Fappening' Hacker Reveals How He Stole Nude Pics of Over 100 Celebrities

March 16, 2016Swati Khandelwal
Almost one and a half years ago after the massive leakage of celebrities' nude photographs — famous as " The Fappening " o...
Social Engineering — Free Online Training for Hackers

Social Engineering — Free Online Training for Hackers

October 20, 2015Wang Wei
For most of us Hacking is Technological in Nature. But, we usually forget the most important element of hacking that makes a successful ...
Phishing Your Employees: Clever way to Promote Cyber Awareness

Phishing Your Employees: Clever way to Promote Cyber Awareness

July 19, 2015Swati Khandelwal
Employees are the weakest link when it comes to enterprise security, and unfortunately hackers realized this years ago. All an attacker ...
This Simple Trick Requires Only Your Phone Number to Hack your Email Account

This Simple Trick Requires Only Your Phone Number to Hack your Email Account

June 19, 2015Wang Wei
We all have been receiving spam phone calls and messages on almost daily basis from scammers who want to pilfer your money and personal ...
Dyre Wolf Banking Malware Stole More Than $1 Million

Dyre Wolf Banking Malware Stole More Than $1 Million

April 03, 2015Swati Khandelwal
Security researchers have uncovered an active cyber attack campaign that has successfully stolen more than $1 Million from a variety of ...
SEANux — Syrian Electronic Army To Release its Own Linux-based Distribution

SEANux — Syrian Electronic Army To Release its Own Linux-based Distribution

October 13, 2014Mohit Kumar
Lots of Linux distributions are offered free of cost on the Internet by a number of companies, non-commercial organizations and by many ...
Book — Unmasking the Social Engineer: The Human Element of Security

Book — Unmasking the Social Engineer: The Human Element of Security

August 05, 2014Wang Wei
If we talk about old days, a hacker often rely on the natural helpfulness as well as weaknesses of people whom he wanted to target. This...
Facebook Self-XSS Scam Fools Users into Hacking Themselves

Facebook Self-XSS Scam Fools Users into Hacking Themselves

July 28, 2014Swati Khandelwal
Scammers have again targeted more than one billion active users of the popular social networking giant Facebook, to infect as many victi...
Gameover ZeuS Trojan Targets Users of Monster.com Employment Portal

Gameover ZeuS Trojan Targets Users of Monster.com Employment Portal

March 25, 2014Swati Khandelwal
Zeus Trojan is one of the most popular families of Banking Trojan, which was also used in a targeted malware campaign against a Salesfor...
Gameover Malware, variant of ZeuS Trojan uses Encryption to Bypass Detection

Gameover Malware, variant of ZeuS Trojan uses Encryption to Bypass Detection

February 03, 2014Swati Khandelwal
The year begins with the number of new variants of malware that were discovered by various security researchers. The new variants are ...
BIOS Malware that can remotely destroy any computer, NSA claimed

BIOS Malware that can remotely destroy any computer, NSA claimed

December 16, 2013Wang Wei
During a CBS Interview show " 60 Minutes ", The National Security Agency (NSA) officials claimed that China has developed a BIOS ...
New Phishing attack targets Italian Postal and Financial service again

New Phishing attack targets Italian Postal and Financial service again

October 21, 2013Anonymous
A phishing attack is a complex combination of technology and psychology. There are numerous ways in which people are being made fools a...
Importance of Logs and Log Management for IT Security

Importance of Logs and Log Management for IT Security

October 02, 2013Wang Wei
IT Security is the name of the game and no matter how big or small the size of your organization, you will always invest enough on sec...
Russian Hacker put up an Android Firefox Zero-Day Exploit for Sale

Russian Hacker put up an Android Firefox Zero-Day Exploit for Sale

September 13, 2013Mohit Kumar
A Russian Exploit writer and underground Hacker who goes by the handle " fil9 " put up an Android Firefox Zero-Day Exploit for...
UK banks hit by Ramnit banking malware and social engineering attacks

UK banks hit by Ramnit banking malware and social engineering attacks

May 01, 2013Mohit Kumar
A dangerous variant of the Ramnit malware has been discovered targeting the UK's financial sector. Trusteer claims to have discovere...
Social Engineering Skype Support team to hack any account instantly

Social Engineering Skype Support team to hack any account instantly

April 10, 2013Mohit Kumar
You can install the industry’s strongest and most expensive firewall. You can educate employees about basic security procedures and the ...
Zendesk security breach, "We've been hacked"

Zendesk security breach, "We've been hacked"

February 22, 2013Mohit Kumar
Customer service software provider Zendesk announced a security breach, that affected three major Zendesk clients i.e Tumblr, Pinterest a...
Android Malware that can DDoS Attacks from your smartphone

Android Malware that can DDoS Attacks from your smartphone

December 28, 2012Wang Wei
The Russian anti-virus vendor Doctor Web has found a new malicious program for Android which allows hacker groups to carry out mobile deni...
Cyber Criminals phishing with smart subdomains to earn millions

Cyber Criminals phishing with smart subdomains to earn millions

December 06, 2012Mohit Kumar
Like many other security issues that now affect computer users, there is a growing threat known as phishing". Phishing attacks are p...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.