The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: vulnerabilities

Red Hat patches multiple web application Vulnerabilities

Red Hat patches multiple web application Vulnerabilities

January 03, 2013Mohit Kumar
RED HAT has fixed multiple web application security issues that allowed hackers to extract website database using Blind SQL injection. Re...
Hackers abusing online Nmap Port Scanning service

Hackers abusing online Nmap Port Scanning service

December 28, 2012Mohit Kumar
Most of you knows the power of Nmap, When used properly, Nmap helps protect your network from invaders. One of the best tool for hackers...
Stabuniq Trojan rapidly stealing data from US banks

Stabuniq Trojan rapidly stealing data from US banks

December 23, 2012Mohit Kumar
Trojan.Stabuniq geographic distribution by unique IP address Security researchers from Symantec have identified a new Trojan that app...
Hunting vulnerabilities in SCADA systems, we are still too vulnerable to cyber attacks

Hunting vulnerabilities in SCADA systems, we are still too vulnerable to cyber attacks

December 17, 2012Anonymous
Stuxnet case is considered by security expert the first concrete act of cyber warfare, a malware specifically designed to hit SCADA systems ...
Apache Tomcat Multiple Critical Vulnerabilities

Apache Tomcat Multiple Critical Vulnerabilities

December 05, 2012Mohit Kumar
Some critical vulnerabilities have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security...
Multiple MySQL database Zero-day vulnerabilities published

Multiple MySQL database Zero-day vulnerabilities published

December 03, 2012Mohit Kumar
Researcher discovered Multiple Zero-day vulnerabilities in MySQL database software including Stack based buffer overrun, Heap Based Ove...
Java zero-day exploit sold in underground Market

Java zero-day exploit sold in underground Market

November 27, 2012Anonymous
Once again a zero day vulnerability exploit is sold by cyber criminals in the underground, once again a the flaw is related to Oracle’s Java...
PayPal Bug Bounty Program - playing fair ?

PayPal Bug Bounty Program - playing fair ?

November 13, 2012Mohit Kumar
Bug Bounty program, where white hat hackers and researchers hunt for serious security vulnerabilities and disclosing them only to the v...
Chrome 23 Released, 14 vulnerabilities patched

Chrome 23 Released, 14 vulnerabilities patched

November 06, 2012Mohit Kumar
Google today released Chrome version 23 to the Stable Channel. 23.0.1271.64 for Windows, Mac, Linux, and Chrome Frame. Update includes patch...
Patch released for 7 critical Adobe Flash Player Vulnerabilities

Patch released for 7 critical Adobe Flash Player Vulnerabilities

November 06, 2012Mohit Kumar
Adobe release updates for Flash Player on Windows, Mac, and Linux to address 7 recently identified critical security vulnerabilities. Up...
Anonymous hack 30000 accounts and Social Security Numbers from 'Telecom Italy'

Anonymous hack 30000 accounts and Social Security Numbers from 'Telecom Italy'

November 05, 2012Mohit Kumar
" Please don't mind, its 5th of November " slogan for today ! Anonymous Hackers hacked into " Telecom Italy &qu...
Airline, Myspace, Banks, Government websites vulnerable to Hackers

Airline, Myspace, Banks, Government websites vulnerable to Hackers

November 04, 2012Mohit Kumar
Cross Site Scripting (XSS) is currently the most common vulnerability in the world. This is vulnerability of some host which allows an...
Bug Hunters have Windows 8 Zeroday Exploit

Bug Hunters have Windows 8 Zeroday Exploit

November 01, 2012Mohit Kumar
French security researcher firm and famous bug hunters at Vupen announced that it had already developed an exploit that could take over a Wi...
Critical infrastructure managing software vulnerable to Unauthorized access

Critical infrastructure managing software vulnerable to Unauthorized access

October 25, 2012Mohit Kumar
Reid Wightman from security firm ioActive reported that there is an undocumented backdoor available in   CoDeSys  software that actually u...
Cyber threats a major risk to business

Cyber threats a major risk to business

October 22, 2012Mohit Kumar
When it comes to security, small and midsize businesses are largely unaware of the risks they face. Cybercrime is a serious problem whic...
White House : No evidence of Espionage by Huawei

White House : No evidence of Espionage by Huawei

October 19, 2012Mohit Kumar
According to a White House-ordered review , a giant Chinese technology company " Huawei " is not a state-sponsored espionage t...
Security weakness in Android App SSL Implementations

Security weakness in Android App SSL Implementations

October 19, 2012Mohit Kumar
The most common approach to protect data during communication on the Android platform is to use the Secure Sockets Layer (SSL) or Transp...
Advance Phishing Attacks using HTML5 Fullscreen API

Advance Phishing Attacks using HTML5 Fullscreen API

October 12, 2012Mohit Kumar
Do your ever use YouTube Instant Search engine (a really fast way to search YouTube) ? That was developed by a 21 years old developer n...
SCADA Hacking : Exploit released to Hack Solar Energy Plants

SCADA Hacking : Exploit released to Hack Solar Energy Plants

October 12, 2012Mohit Kumar
ICS-CERT - Industrial Control Systems Cyber Emergency Response Team has released the Advisory titled ICS-ALERT-12-284-01 - Sinapsi eSol...
Firefox 17 Beta Released with Click-to-Play Plugins for blocking vulnerable Plugins

Firefox 17 Beta Released with Click-to-Play Plugins for blocking vulnerable Plugins

October 12, 2012Mohit Kumar
Last week, Mozilla announced it will prompt Firefox users on Windows with old versions of Adobe Reader, Adobe Flash, and Microsoft Silv...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.