-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

Oct 17, 2011
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety Google’s first ever advertising campaign for online safety launches today, in association with the Citizens Advice Bureau. It covers topics such as choosing a password, scam emails and using two factor authentication.The company said future campaigns may deal more extensively with how Google uses people's personal data. The two organisations by using various means and methods, like using adverts in newspapers, on public transports and online, will try to encourage users to adopt secure passwords, log out of web browsers and computers after using them and also to adopt more complex ways to sign in their email accounts which is known as “two-factor authentication”.The campaign also focuses on child protection and use of ‘cookies’ in web browsers. This is the first campaign by Google, which is promoting something different than products such as web browser Chrome. The campaign is p...
Miley Cyrus Needs A Lecture on Cyber Security

Miley Cyrus Needs A Lecture on Cyber Security

Oct 17, 2011
Miley Cyrus Needs A Lecture on Cyber Security The man, who is currently facing up to 121 years behind bars, has been charged with 26 counts of identity theft , wire-tapping and unauthorised access to protected computer.Chaney, who has been in contact with TMZ for the last two years, has contacted the gossip website with details on how he hacked into Miley Cyrus's Gmail account. With celebrity phone hacker Christopher Chaney arrested, another hacker has reached out to TMZ to share how laughably easy it was for him to hack into Miley Cyrus‘ Gmail account. Here’s a lesson in the Internet, Miley: Don’t use the name of your best friend (which the Internet knows) as your security question.First he tracked down her Gmail name; though he doesn’t say what it is, I just did a quick Google search and came up with two possibilities through Yahoo! Answers already. Obviously that part won’t take long. When he tried to log in, he got a security question—the name of one of Miley’s girlfriends...
Sesame Street YouTube Channel Hacked, Porn Posted

Sesame Street YouTube Channel Hacked, Porn Posted

Oct 17, 2011
Sesame Street YouTube Channel Hacked, Porn Posted On Sunday afternoon, some of the world’s worst lowlifes decided to hack the Sesame Street YouTube channel and replace some of the videos with pornographic clips. For about 20 minutes yesterday, visitors to the YouTube channel of the popular children’s show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page’s banner to read, “ SESAME STREET: I’TS [sic] WHERE PORN LIVES .” In the profile description, the hackers wrote: “ WHO DOESN’T LOVE PORN KIDS? RIGHT! EVERYONE LOVES IT…PLEASE DON’T LET SESAME STREET TO GET THIS ACCOUNT BACK KIDS …WE GONNA MAKE ALL THE AMERICA HAPPY! ” " We apologize for any inconvenience our audience may have experienced yesterday on our Sesame Street YouTube channel ," read a message on the channel's home page , which appeared to have been restored around 11 a...
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology

Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology

Oct 17, 2011
Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology Armorize Partners With Symantec to Provide Its Powerful Anti-Malvertising Technology to Symantec's New Solution, AdVantage, to Help Customers Protect Themselves From the Growing Threat of Malicious Advertising Attacks. The partnership will utilize the advanced malware detection engine from Armorize's successful HackAlert product lines to power Symantec's new cloud-based anti-malvertising solution, Symantec AdVantage.The Symantec AdVantage solution will provide its customers with the ability to monitor the ads displayed on their websites for web malware. The product dashboard will also present valuable statistics which enable publishers to compare the quality of ads and ad networks they work with based on the safety ratings and reputation scores for each specific ad or network. Some of the users who visited KickassTorrents (KAT), one of the most popular torrent trackers on the Internet, ...
UNESCO E-platform domain got hacked by Fatal Error Crew

UNESCO E-platform domain got hacked by Fatal Error Crew

Oct 16, 2011
UNESCO E-platform domain got hacked by Fatal Error Crew The E-Platform domain of one of the Biggest Organisation United Nations Educational, Scientific and Cultural Organization (UNESCO) got hacked and defaced by Fatal Error Crew hackers . Mirror of hack is available here . 
Cyber Cell Mumbai Websites hacked by Pakistani Hacker

Cyber Cell Mumbai Websites hacked by Pakistani Hacker

Oct 15, 2011
Cyber Cell Mumbai  Websites hacked by Pakistani Hacker Pakistani hacker " Shadow008 " from Pakistani Cyber Army again strike back on India's Most Important website of Cyber cell located at Mumbai , India. The Websites is Defaced today Morning and Mirror of Hack also available on Legend-h .This is not 1st time when Indian law enforcement agency site become the target of Pakistani hackers. Last Year, CBI website was also defaced by same "Pakistani Cyber Army".  Hacker post the reason of Hack on deface page as " Site Has Be Hacked For Revenge after they hacked our Pakistani Sites ". Right Now, Site is Recovered back to Original One by officials.
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Oct 15, 2011
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration] " Encipher It " One of the best and easiest AES Text encryptor for Google Mail or anything else. It Provide more secure PBKDF2 (Password-Based Key Derivation Function) key generation. It use Advanced Encryption Standard to protect your data. All encoding/decoding is performed locally in your browser. Video Demonstration by Network NUTS : Subscribe " Network Nuts " You Tube Channel for More Linux Tutorials. Try " Encipher It " Now !
Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Oct 15, 2011
Artillery 0.1 alpha  - New tool for Linux Protection by ReL1K A new Tool " Artillery " - for Linux Protection has been Released by ReL1K (Founder DerbyCon, Creator of the Social-Engineer Toolkit). It’s written in Python and completely open-source. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. It’s extremely light weight, has multiple different methods for detecting specific attacks and eventually will also notify you of insecure nix configurations. Features: If anyone decides to port scan or touch those ports, they are blacklisted immediately and permanently. It’s multi-threaded and can handle as many connections thrown at it. Monitor file integrity leveraging sha-512 database Keeps track of all system files and if anything changes Artillery also monitors the SSH logs, and the event of a brute force attack, blacklists the host forever Extremely Simple Configuration ( /var/artillery/config ) ...
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Oct 14, 2011
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran GRAND RAPIDS – Cyber Styletto is a new novella by a journalist, a writer, and a security expert who have pooled their talents to create an enthralling good read that is future forward and predictive. The facts are based on real vulnerabilities in the way the Internet is constructed. Recent cyber security attacks using sophisticated malware (think Stuxnet) and social engineering techniques have raised the bar for defenders. Cyber Styletto pivots off these cyber events to educate and entertain. It is written as fact-based fiction. The story comes from the minds of Gian DeTorre and Mike Brennan. DeTorre is the pen name of an award winning fiction writer and literary critic whose stories and reviews have been published worldwide. “ Cyber Styletto is a new genre in literature, bringing the modern, secretive world of cyber espionage together with a good, old-fashioned thriller ,” DeTorre said. I hope our a...
GateOne Beta - Terminal emulator for HTML5 web browsers

GateOne Beta - Terminal emulator for HTML5 web browsers

Oct 14, 2011
GateOne Beta - Terminal emulator for HTML5 web browsers The software makes use of WebSockets to connect a server backend written in Python and a frontend written for modern browsers in JavaScript, HTML5 and CSS. The frontend doesn't require any browser plug-ins to be installed.Gate One also supports HTTP over SSL (https) secure connections from the browser to the server and authentication technologies such as Kerberos. It has its own internal plug-in system (plug-ins can be written in Python, JavaScript and CSS); currently available plug-ins for Gate One include SSH client connections, session recording and playback, and a bookmark manager for storing terminal sessions. Top features: * No browser plugins required! * Supports multiple simultaneous terminal sessions. As many as your hardware can handle. * Users can re-connect to their running terminals whenever they like from anywhere. * Can be embedded into other applications. Add a terminal--running whatever appl...
Expert Insights Articles Videos
Cybersecurity Resources