-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

In.com Hacked and Defaced by Mr52

In.com Hacked and Defaced by Mr52

Aug 11, 2011
In.com Hacked and Defaced by Mr52 One of the Leading Indian website " In.com " has been defaced by Indian Hacker Mr52 .This is the 3rd Biggest Site Hit by Mr52. He Upload shell on the Server for Defacing site. Readers can check the Linux Kernel and Username even also from Screenshot. Defaced Url :  http://mobile18.in.com/ Mirror of Hack :   http://zone-h.com/mirror/id/14643631
NERC - National Syrian energy research center Defaced by Cocain Team

NERC - National Syrian energy research center Defaced by Cocain Team

Aug 11, 2011
NERC - National Syrian energy research center Defaced by Cocain Team Cocain Hackers Team once again Hit Syrian. This time they hack and deface the website of  National Syrian energy research center . Site was defaced Yesterday and administrator again backup the site, But Readers can check hack mirror here .  Last week Official site of NDRRMC  and  Youth Peer Education Network (YPEER) Of Syria were hacked by Cocain TeaM.
SpyEye 1.3.45 Download - Loader source code

SpyEye 1.3.45 Download - Loader source code

Aug 11, 2011
SpyEye 1.3.45 Download - Loader source code A new fresh and sophisticated web-based bot named SpyEye is around in the markets and looks like to be the possible successor of the famous Zeus Trojan due to its very interesting features, with the main objective to steal bank accounts, credit cards, ftp accounts and other sensitive data from the victim’s computer. SpyEye was written in C++ and the size of the compiled binary is of 60 KB, the operating systems supported are from Windows 2000 to the recent Windows 7, it works in ring3 mode (same as Zeus Trojan). It is sold as undetected from most Antivirus Software and it is invisible from the task managers and other user-mode applications, it hides the files from the regular explorer searches and it hides also its registry keys. Snorre Fagerland, Senior Virus Analyst at Norman, briefly explains what the SpyEye online banking trojan is and what you need to be on the lookout for when banking online. SpyEye is actually sold by its au...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
FireCAT 2.0 Released - Firefox Catalog of Auditing Extensions

FireCAT 2.0 Released - Firefox Catalog of Auditing Extensions

Aug 11, 2011
FireCAT 2.0 Released - Firefox Catalog of Auditing Extensions FireCAT (Firefox Catalog of Auditing exTensions) is a mindmap collection of the most efficient and useful Firefox extensions oriented application security auditing and assessment. FireCAT is not a replacement of other security utilities and software as well as fuzzers, proxies and application vulnerabilities scanners. FireCAT v2.0 - Firefox Catalog of Auditing exTensions Information Gathering Proxies & Web Utilities Editors Network Utilities Misc IT Security Related Application Auditing Download FireCAT here
University of Wisconsin-Milwaukee hacked - 75,000 social security numbers exposed

University of Wisconsin-Milwaukee hacked - 75,000 social security numbers exposed

Aug 11, 2011
University of Wisconsin-Milwaukee hacked - 75,000 social security numbers exposed University of Wisconsin-Milwaukee was the target. Malicious code was discovered on a document management database server. The university contacted law enforcement and after a month-long investigation realized that the database on the system contained over 75,000 records that included social security numbers for both students and employees. Nobody is sure how long the malware was running on the server, but it was shutdown once the breach was found. It’s suspected that the software was being used to identify cutting edge research that the school is working on, but that has yet to be confirmed. It’s also good to know that while students may have had their identity stolen, the database contained no “ academic information such as student grades ,” so at least the attackers won’t be able to identify whether students passed their criminology courses.
UNITED Security Summit 2011, 19-20 September - San Francisco

UNITED Security Summit 2011, 19-20 September - San Francisco

Aug 11, 2011
UNITED Security Summit 2011 , 19-20 September - San Francisco The UNITED Security Summit is focused on innovation and collaboration in the security community. Bringing together security decision makers, practitioners, commercial vendors, open source projects and academia, the Summit highlights technologies and approaches that will help organizations better cope with the increased security threats they are seeing on a daily basis.Based on the anatomy of a breach, the Summit provides educational and interactive sessions that will reflect on the fundamental security challenges from four perspectives through a common lens. Date : 19 September-20 September 2011 Location : Hyatt Fisherman's Wharf, San Francisco, USA
JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency

JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency

Aug 11, 2011
JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers. What is new? JonDo now integrates Bitcoin as additional payment method for the JonDonym Premium services: For every new payment, a new random Bitcoin address is generated. This hides against third parties for what a customer pays. Additionally, all data about the payment proccess are deleted after completion in order to fulfill even the highest privacy requirements. But of course, even if the identity of a buyer was known, neither JonDos nor the JonDonym operators could see what he/she does in the JonDonym system. Moreover, a stability protection against connection manipulations has been developed: In some countries, especially those in the middle east, HTTPS/SSL connections get manipulat...
HKEx - Hong Kong stock exchange Hacked

HKEx - Hong Kong stock exchange Hacked

Aug 11, 2011
HKEx - Hong Kong stock exchange Hacked Trading in Hong Kong was disrupted on Wednesday by a hacking incident on the Hong Kong Exchange website. " Our current assessment that this is a result of a malicious attack by outside hacking ," Charlies Li, chief executive of Hong Kong Exchanges & Clearing, told reporters. The seven stocks in question were all due to release sensitive results to the website that could impact the price of their stocks.Although the Hong Kong stock exchange also operates an alternative backup site for posting the results, it chose to halt trading of the affected stocks for the afternoon session.Stocks affected included HSBC, Cathay Pacific, China Power International and the Hong Kong exchange itself.It is unclear at this point whether the attack actually compromised the site, or if it was merely a denial of service attack. " It was the first time for a suspension due to such a kind of technical problem and one involving so many companies ,...
Hungry Hackers website hacked by CyberMind

Hungry Hackers website hacked by CyberMind

Aug 11, 2011
Hungry Hackers website hacked by CyberMind One of the Famous Hacking Tips and Tricks site "Hungry Hackers" -  http://www.hungry-hackers.com/  for Beginners got Hacked and Defaced by  CyberMind . The Hack shows that " Hackers are also not safe " . Update : Same site was also hacked on 2011-07-29 by Group Hp-Hack - Dr.TaiGaR and NeT DeviLSaudi Arabia Hackers . Mirror of hack can be seen here
Hackers Get Hacked at #Defcon 19 Conference

Hackers Get Hacked at #Defcon 19 Conference

Aug 10, 2011
Hackers Get Hacked at # Defcon 19 Conference There are so many ways to get hacked at the world’s largest hacker conference. A hacker could bump against your pocket with a card reader that steals your credit card information. Or a hacker might eavesdrop on your Internet traffic through an unsecured Wi-Fi network. Or a hacker might compromise your cell phone while you charge it in the hotel’s public phone-charging kiosk. More than 10,000 hackers and security experts have descended upon the Rio Hotel and Casino in Las Vegas this weekend for three days of lectures and contests. A hacker with name Coderman claim about such an incident Happens at Rao Hotel Well by early Saturday morning a weapon was deployed in DefCon. Some characteristics of Hack Attack : - full active MitM against CDMA and 4G connections from Rio to carriers. - MitM positioning for remote exploitation to ring0 on Android and PC. - fall back to userspace only or non-persistent methods when p...
Expert Insights Articles Videos
Cybersecurity Resources