-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Distribution Release : SystemRescueCd 2.1.0 Download

Distribution Release : SystemRescueCd 2.1.0 Download

Apr 07, 2011
François Dupoux has released an updated version of SystemRescueCd, a Gentoo-based live CD containing a collection of utilities for disk management and data rescue tasks. What's new in version 2.1.0? "Updated standard kernels to 2.6.35.12 (long-term kernel: rescuecd + rescue64); alternative kernels re-based on linux-2.6.38.2 (most recent kernel); patched alternative kernels with loop-aes-3.6b (encrypt disks using AES); updated Testdisk to 6.11.3 (checks and undeletes partitions + PhotoRec); updated hdparm to 9.36 (utility to change hard drive parameters); updated the Xfce desktop environment to new major version 4.8; updated gDisk to 0.7.1 (the package has been renamed gptfdisk); 32-bit kernels (rescuecd + altker32) compiled for i586 instead of i686." Change log.  Updated standard kernels to 2.6.35.12 (long-term kernel: rescuecd + rescue64) Alternative kernels rebased on linux-2.6.38.2 (most recent kernel) Patched alternative kernels with loop-aes-3.6b (encrypt d...
One More Xbox Live director hacked !

One More Xbox Live director hacked !

Apr 06, 2011
Here’s an interesting way to get noticed for a job (or fine) by Microsoft.. A hacker known as “Predator” has been able to phish information from Xbox Live’s Director of Policy and Enforcement, Stephen Toulouse (aka “Stepto”), gaining email and address information via his personal website server and was then able to alter the Chief’s details online. This latest hacker attack on Xbox Live accounts follows a leak of info belonging to Director of Programming Larry Hryb (aka “Major Nelson”) around this time last year. On the outset no serious harm was done by the little scam, but it’s a scam “Predator” hopes will make a statement to Microsoft in regards to their security policies. He states “I’m simply letting them know I’m willing to help them secure accounts from future hackers” – an innovative method of self-promotion! In a boastful video uploaded to YouTube “Predator” claims to be “Xbox Live’s greatest account jacker” and is raking in the cash from causing trouble for Xbox online...
ZeuS Source Code Leaked, Available for Sale !

ZeuS Source Code Leaked, Available for Sale !

Apr 06, 2011
ZeuS Source Code Leaked, Available for Sale ! The source is C++ and supposedly contains everything. The seller is asking for 5500 WebMoney/LibertyReserve for the full source code of version 2.0.8.9. The source code has been leaked but the archive is password-protected. Now there’s a race to see who can crack the password. In addition, someone has even given out an MD5 hash of the password. Dunno if it’s legit but it’s certainly making this an interesting race indeed.
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
Toyota 4x4 - Toyota Land Cruiser Hacked by The 077

Toyota 4x4 - Toyota Land Cruiser Hacked by The 077

Apr 06, 2011
Toyota 4x4 - Toyota Land Cruiser Hacked by The 077 Hacked site :  http://4x4-toyota.fr/
DHCP client allows shell command injection !

DHCP client allows shell command injection !

Apr 06, 2011
The Internet System Consortium's (ISC) open source DHCP client (dhclient) allows DHCP servers to inject commands which could allow an attacker to obtain root privileges. The problem is caused by incorrect filtering of metadata in server response fields. By using crafted host names, and depending on the operating system and what further processing is performed by dhclient-script, it can allow commands to be passed to the shell and executed. A successful attack does, however, require there to be an unauthorised or compromised DHCP server on the local network. Dhclient versions 3.0.x to 4.2.x are affected. The ISC has released an update. Alternatively, users can deactivate host name evaluation or add an additional line to dhclient-script. Instructions for doing so can be found in the ISC's advisory. Alongside dhclient-script, X.org's 'X server resource database utility' (xrdb) is also affected, as it also evaluates host names transferred via DHCP. Crafted host name...
Govt of Orissa website Owned by ZHC XtreMist [ZHC]

Govt of Orissa website Owned by ZHC XtreMist [ZHC]

Apr 06, 2011
Govt of Orissa website Owned by ZHC XtreMist [ZHC] Hacked site :  http://zssmayurbhanj.gov.in/ Mirror:- http://zone-h.org/mirror/id/13421065
India's CBI plans to send teams to US, Europe to trace hackers !

India's CBI plans to send teams to US, Europe to trace hackers !

Apr 06, 2011
Against the backdrop of the attack on its website by " Pakistan Cyber Army ", the CBI is considering to send its team to the US and Europe to trace hackers involved in the defacement. Sources said the agency officials have pin-pointed three Internet Protocol (IP) address -- a unique numerical label borne by each computer in a network that use worldwide web for communications -- two originated from Seattle, Pennsylvania in the US and other in Daugavpils, Latvia in northern Europe. They said the agency has moved a local court here seeking permission to access authorities in the US and Latvia for collecting information on the IP addresses. The CBI had on December 4 last year registered a case against unknown persons of " Pakistani Cyber Army " for hacking and defacement of its website under various Sections of Information Technology Act.
New Chinese MBR Rootkit Identified

New Chinese MBR Rootkit Identified

Apr 06, 2011
A new rootkit that uses the master boot record (MBR) to hide itself has been discovered in China and is being used to install an online game password stealer. The bootkit is installed on the computer by a trojan downloader distributed from a Chinese adult site and is detected by Kaspersky as Rookit.Win32.Fisp.a. Once executed, the rootkit makes a copy of the old MBR and replaces the sectors with its own code which includes an encrypted driver. When the computer boots, the malicious code executes and restores the original MBR so that Windows can load normally. It then uses hooks to replace the fips.sys system driver with a malicious one. "It should be noted that the driver fips.sys is not required for the operating system to run correctly, so the system won’t crash when it is replaced," says Kaspersky Lab expert Vyacheslav Zakorzhevsky. The driver scans loaded processes to determine if they belong to one of over a dozen antivirus programs and prevent them from running...
MumbaiITPro User Group Hacked by TriCk [TeaMp0isoN]

MumbaiITPro User Group Hacked by TriCk [TeaMp0isoN]

Apr 05, 2011
MumbaiITPro User Group Hacked by TriCk [TeaMp0isoN] MumbaiITPro User Group is an online technical community initiative for the IT Professionals. They are supported by Global IT Community Association (GITCA) and Microsoft Corporation. Hacked site :  http://mumbaiitpro.org/ Mirror :  http://mirror.sec-t.net/defacements/?id=7039
Hosting company Hostkey.ru got Compromised !

Hosting company Hostkey.ru got Compromised !

Apr 04, 2011
Hosting company Hostkey.ru got Compromised ! A hacked Hacked Into Hosting company Hostkey.ru, some Proof of hacks are here : 1.)  Cms Hacked 2.) PhpMyAdmin Hacked 3.) Shell on Server 4.) Config File http://pastebin.com/VbuD0acE 5.) Server Rooted http://pastebin.com/h5RW3w6c Full compromise step-by-step @ forum http://tinyurl.com/dusbitchez News Source :  anonymous 
Expert Insights Articles Videos
Cybersecurity Resources