-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Preview : Web App Hacker's Handbook 2nd Edition !

Preview : Web App Hacker's Handbook 2nd Edition !

May 12, 2011
Preview : Web App Hacker's Handbook 2nd Edition ! The first draft of the new edition of WAHH is now completed, and the lengthy editing and production process is underway. Just to whet everyone's appetite, I'm posting below an exclusive extract from the Introduction, describing what has changed in the second edition. (And in a vain attempt to quell the tidal wave of questions: the book will be published in October; there won't be any more extracts; we don't need any proof readers, thanks.) What’s Changed in the Second Edition? In the four years since the first edition of this book was published, much has changed and much has stayed the same. The march of new technology has, of course, continued apace, and this has given rise to specific new vulnerabilities and attacks. The ingenuity of hackers has also led to the development of new attack techniques, and new ways of exploiting old bugs. But neither of these factors, technological or human, has created a rev...
275 Sites Hacked by jumbo (Umer Rock)

275 Sites Hacked by jumbo (Umer Rock)

May 12, 2011
275 Sites Hacked by jumbo (Umer Rock) Sites: http://pastie.org/1891679 mirror: http://mirror.sec-t.net/hacker/?s=1&user=Umer+Rock
Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download !

Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download !

May 11, 2011
Finally Source code of ZeuS Botnet Version: 2.0.8.9  available for Download ! Download Link :  http://www.multiupload.com/P8QUNF4YJN Rar password : zeus Read More :  Complete ZeuS source code has been leaked ! ' The Hacker News ' Magazine -   Social Engineering Edition  - Issue 02 - May,2011 Released ! Download Now
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Wikileaks Founder, Assange gets Sydney Peace Prize !

Wikileaks Founder, Assange gets Sydney Peace Prize !

May 11, 2011
Wikileaks Founder, Assange gets Sydney Peace Prize ! WikiLeaks founder Julian Assange was Wednesday awarded the Sydney Peace Foundation's top honor for "exceptional courage in pursuit of human rights," joining the likes of Nelson Mandela and the Dalai Lama. Assange, an Australian former computer hacker who is fighting extradition from Britain to Sweden over alleged sex crimes, was praised and rewarded with the Sydney Peace Prize's Gold Medal. Although the Peace Prize is awarded annually by the foundation only three other people in its 14-year history have been awarded the gold award for courage in pursuit of human rights -- the Dalai Lama, Nelson Mandela and Japanese Buddhist leader Daisaku Ikeda. The foundation paid tribute to Assange's determination to seek greater transparency and accountability from governments around the world, having challenged "centuries old practices of government secrecy." "By championing people's right to k...
Hacked PlayStation Network to be fully restored by end of May !

Hacked PlayStation Network to be fully restored by end of May !

May 11, 2011
Hacked PlayStation Network to be fully restored by end of May ! Sony said Tuesday it aimed to fully restore its PlayStation Network, shut down after a massive security breach affecting more than 100 million online accounts, by the end of May. Sony also confirmed that personal data from 24.6 million user accounts was stolen in the hacker attack last month. Personal data, including credit card numbers, might have been stolen from another 77 million PlayStation accounts, said Sony Computer Entertainment Inc. spokesperson Satoshi Fukuoka. He said Sony has not received any reports of illegal uses of stolen information, and the company is continuing its probe into the hacker attack. He declined to give details on the investigation. Sony shut down the PlayStation network, a system that links gamers worldwide in live play, on April 20 after discovering the security breach. The network also allows users to upgrade and download games and other content. Sony was under heavy criticism o...
ICSE Guess compromised, over 1 lakh 10 thousand users hacked by lionaneesh !

ICSE Guess compromised, over 1 lakh 10 thousand users hacked by lionaneesh !

May 11, 2011
ICSE Guess compromised, over 1 lakh 10 thousand users hacked by lionaneesh ! Admin User/Pass leaked By Indian hacker Loinaneesh. There are more than 1 lakh 10 thousand users data stolen. Big sites, Less Security :P
NCASC & 3 More Nepal Government Sites Hacked By cool_sh4v1k

NCASC & 3 More Nepal Government Sites Hacked By cool_sh4v1k

May 11, 2011
NCASC & 3 More Nepal Government Sites Hacked By cool_sh4v1k Hacked Sites : http://necan.gov.np/license.html http://epsnepal.gov.np/license.html http://ncasc.gov.np/license.html http://nepalstandards.gov.np/license.html Mirrors : http://www.zone-h.net/mirror/id/13681612 http://www.zone-h.net/mirror/id/13681609 http://www.zone-h.net/mirror/id/13681610 http://www.zone-h.net/mirror/id/13681611
Microsoft Releases Patch Tuesday Fixes for Windows Server and PowerPoint !

Microsoft Releases Patch Tuesday Fixes for Windows Server and PowerPoint !

May 10, 2011
Microsoft Releases Patch Tuesday Fixes for Windows Server and PowerPoint ! Microsoft addressed two security bulletins in May’s Patch Tuesday release. Despite its small size, security experts said administrators should apply the fixes immediately as they addressed significant threats. Microsoft fixed a critical vulnerability affecting Windows Server and an important bug in Microsoft Office PowerPoint, according to the Patch Tuesday advisory released May 10. Microsoft also assigned separate “exploitability” scores for newer versions of the software under the “improved” exploitability index ratings. The team fixed a critical vulnerability (MS11-035) in the WINS component in Windows Server 2003 and 2008. WINS is a name resolution service that resolves names in the NetBIOS namespace and does not require authentication to use. While usually not available by default in Windows Server, it is commonly used in the enterprise for internal network servers. Administrators who have enabled WIN...
White House Cyber-Security Strategy Could Guard Health Care Payments !

White House Cyber-Security Strategy Could Guard Health Care Payments !

May 10, 2011
The National Strategy for Trusted Identities in Cyberspace aims to help consumers pay for services such as health care more securely and avoid identity theft. Recent guidelines issued by the White House on cyber-security could provide an impetus for secure online bill paying in health care, according to health care industry experts. The National Strategy for Trusted Identities in Cyberspace presented by the White House provides direction on how to protect consumers and businesses from identity theft and fraud in online transactions by creating an identity ecosystem. Under the ecosystem strategy, consumers would maintain their anonymity during transactions by providing one piece of information, such as age, but not name, address, birth date or other information. "The rapid and vastly positive changes that have followed the rise of online transactions—like making purchases or downloading bank statements—have also led to new challenges," President Obama wrote in the str...
BackTrack 5 Released - Direct FTP Download Now !

BackTrack 5 Released - Direct FTP Download Now !

May 10, 2011
BackTrack 5 Released – Penetration Testing Distribution, Download Now ! Download : http://www.backtrack-linux.org/downloads/ Direct Links from FTP :  http://mirrors.rit.edu/backtrack/
Expert Insights Articles Videos
Cybersecurity Resources