#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

software security | Breaking Cybersecurity News | The Hacker News

Category — software security
Hacker Poses as Graduate, Hacks Student Emails, Faces Legal Consequences

Hacker Poses as Graduate, Hacks Student Emails, Faces Legal Consequences

Dec 01, 2010
A hacker who posed as a university graduate to access the emails of hundreds of students has been given a suspended prison sentence and ordered to pay more than £20,000 in costs and compensation. Daniel Woo, a 23-year-old Bulgarian national, was sentenced for offenses under the Misuse of Computers Act on November 25. Woo was arrested in November 2006 at the University of London's School of Oriental and African Studies after IT staff noticed anomalies in the computer network's operation. He used various hacking techniques to break into students' accounts by obtaining their passwords. Woo then installed software called 'Cain and Able' on several machines, which allowed him to collect additional student passwords and monitor traffic on the university's computer network. It was later confirmed that fraud had occurred on several compromised payment accounts. Additionally, Woo has been banned from entering any university, college, or place of higher education witho...
Hacking Millions of Routers by Craig Heffner

Hacking Millions of Routers by Craig Heffner

Oct 30, 2010 Cybersecurity / Hacking Techniques
After attending several DEFCON events, I am thrilled to announce that I will be speaking at DEFCON 18. My presentation titled "How to Hack Millions of Routers" aims to shed light on prevalent security vulnerabilities. I will also take this opportunity to answer frequently asked questions and provide a glimpse into the content of my upcoming talk. Many people mistakenly believe that disabling remote administration on their routers shields them from unauthorized external access. Unfortunately, this is not the case for many router models. Anyone owning a registered domain can potentially gain full access to a router's internal web interface. This access allows them to exploit vulnerabilities or perform brute-force attacks to alter settings and control the router. This vulnerability extends beyond the primary web interface to SOAP-based services like Universal Plug-n-Play, which do not require authentication. In tests conducted on thirty routers, more than half, including po...
Expert Insights Articles Videos
Cybersecurity Resources