-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Google Enable SSL-based searches, Will impact Google Analytic !

Google Enable SSL-based searches, Will impact Google Analytic !

Oct 18, 2011
Google Enable SSL-based searches, Will impact Google Analytic ! According to a blog post by Google, the company is taking steps towards making search more secure for its users. Users will be redirected to https:// instead of http:// when going to do a Google search. By forcing SSL on http://google.com, all keyword data will be hidden. The company is dedicated to SSL and securing search and privacy for its signed in users. But This will restricting search terms availability and also when user will sign out, One will redirect back to Unencrypted (http://) page. The company says this won’t change reporting data for webmasters who use analytics tools too see how much traffic Google sends them. How will this change impact Google Analytics users? When a signed in user visits your site from an organic Google search, all web analytics services, including Google Analytics, will continue to recognize the visit as Google “organic” search, but will no longer report the query te...
Duqu - Next Major Cyber Weapon like Stuxnet

Duqu - Next Major Cyber Weapon like Stuxnet

Oct 18, 2011
Duqu - Next Major Cyber Weapon like Stuxnet The Stuxnet cyberworm could soon be modified to attack vital industrial facilities in the US and abroad, cybersecurity experts warned Wednesday at a Senate hearing. Computer security companies agree that these virus is unprecedented and it means the dawn of a new world. Stuxnet and Duqu were not designed to steal money or send spam but to sabotage plants and cause damage in industrial environments. Expect the appearance of additional copies. The Stuxnet virus that attacked Iran's nuclear program can cripple the country's nuclear facilities for two years, a German computer expert announced on Wednesday, December 15, 2010. From what researchers can tell, Duqu's mission is to gather intelligence data and assets from entities like industrial control system manufacturers, to more easily conduct a future attack against another third party. According to Symantec, the next threat, dubbed “DuQu” because the code has the code strin...
Famous VPN service Proxpn compromised

Famous VPN service Proxpn compromised

Oct 18, 2011
Famous VPN service Proxpn compromised proXPN is one of the famous VPN client based on OpenVPN Service, today hacked by hacked named " TurkisH-RuleZ ". The Server is seems to be Compromised in this Hacking case. Compromised url is h ttp://proxpn.com/whmcs1/downloads and Mirror of Hack is available here .
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Report says : US considered cyber war on Libya

Report says : US considered cyber war on Libya

Oct 18, 2011
Report says : US considered cyber war on Libya Officials in the US Obama administration considered compromising Libya's government computer networks to block early-warning data gathering and missile launches on NATO war planes during the American-led strikes, but decided against it, according to The New York Times. The report goes on to claim that, while the use of what is believed to be a pre-existing armoury of Trojans, viruses, malware and military hackers was suggested, the cyber-attack was never actually carried out. The attack would have tried to disrupt Libya's early-warning radar system and thus cripple the North African country's ability to fire back at attacking NATO aircraft.But the Obama administration and the Pentagon chose instead to mount a conventional attack, partly because an American cyberattack might have set a dangerous precedent, and Libya might not have been worth the risk. In the end, American officials rejected cyberwarfare and used convent...
Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Oct 17, 2011
Jynx Kit (LD_PRELOAD) Userland Rootkit Released Jynx Kit is a LD_PRELOAD userland rootkit. Fully undetectable from chkrootkit and rootkithunter. Includes magic packet SSL reverse back connect shell based on SEQ/ACK numbers in a single packet. Solid building block for further LD_PRELOAD rootkits. DOWNLOAD HERE Submitted by ErrProne (www.blackhatacademy.org)
More than 10,000 Facebook account hacked by TeamSwaSTika

More than 10,000 Facebook account hacked by TeamSwaSTika

Oct 17, 2011
More than 10,000 Facebook account hacked by TeamSwaSTika Another group of Hackers, self titled Team Swastika, have caused panic amongst Facebook users after releasing the details of 10,000 accounts onto popular text sharing site, Pastebin. Pastebin, usually used to share source code, has frequently been host to a number of text files that contain the details of specific hacks by hackitivists and hacker groups. Team Swastika is just one of these hackitivist groups but claims to be the most powerful hacking team in Nepal. They also said that next target will be Nepal Government website. Facebook hacked account dump: http://pastebin.com/KYsd0j5B (part1) - Removed by Pastebin http://pastebin.com/nN5uDrQS (part2) - Removed by Pastebin
National Cyber Security Bulletin on Anonymous

National Cyber Security Bulletin on Anonymous

Oct 17, 2011
National Cyber Security Bulletin on Anonymous DHS has analyzed the likelihood of Anonymous attacking industrial control systems (ICS) after the hacktivist group showed such intentions earlier this year. " Assessment of Anonymous Threat to Control Systems " that was drafted by the National Cybersecurity and Communications Integration Center (NCCIC) back in September. The document is not classified, but it is intended for official use only. The report describes an interest within Anonymous to target industrial control systems. " The capability of the individual to recognize and post code that would gain the attention of those knowledgeable in control systems, as well as their claims to have access to multiple control systems, indicates the individual has an increased interest in control systems, but does not demonstrate capabilities ," the NCCIC said in its report. Download Complete Bulletin
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

Oct 17, 2011
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety Google’s first ever advertising campaign for online safety launches today, in association with the Citizens Advice Bureau. It covers topics such as choosing a password, scam emails and using two factor authentication.The company said future campaigns may deal more extensively with how Google uses people's personal data. The two organisations by using various means and methods, like using adverts in newspapers, on public transports and online, will try to encourage users to adopt secure passwords, log out of web browsers and computers after using them and also to adopt more complex ways to sign in their email accounts which is known as “two-factor authentication”.The campaign also focuses on child protection and use of ‘cookies’ in web browsers. This is the first campaign by Google, which is promoting something different than products such as web browser Chrome. The campaign is p...
Miley Cyrus Needs A Lecture on Cyber Security

Miley Cyrus Needs A Lecture on Cyber Security

Oct 17, 2011
Miley Cyrus Needs A Lecture on Cyber Security The man, who is currently facing up to 121 years behind bars, has been charged with 26 counts of identity theft , wire-tapping and unauthorised access to protected computer.Chaney, who has been in contact with TMZ for the last two years, has contacted the gossip website with details on how he hacked into Miley Cyrus's Gmail account. With celebrity phone hacker Christopher Chaney arrested, another hacker has reached out to TMZ to share how laughably easy it was for him to hack into Miley Cyrus‘ Gmail account. Here’s a lesson in the Internet, Miley: Don’t use the name of your best friend (which the Internet knows) as your security question.First he tracked down her Gmail name; though he doesn’t say what it is, I just did a quick Google search and came up with two possibilities through Yahoo! Answers already. Obviously that part won’t take long. When he tried to log in, he got a security question—the name of one of Miley’s girlfriends...
Sesame Street YouTube Channel Hacked, Porn Posted

Sesame Street YouTube Channel Hacked, Porn Posted

Oct 17, 2011
Sesame Street YouTube Channel Hacked, Porn Posted On Sunday afternoon, some of the world’s worst lowlifes decided to hack the Sesame Street YouTube channel and replace some of the videos with pornographic clips. For about 20 minutes yesterday, visitors to the YouTube channel of the popular children’s show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page’s banner to read, “ SESAME STREET: I’TS [sic] WHERE PORN LIVES .” In the profile description, the hackers wrote: “ WHO DOESN’T LOVE PORN KIDS? RIGHT! EVERYONE LOVES IT…PLEASE DON’T LET SESAME STREET TO GET THIS ACCOUNT BACK KIDS …WE GONNA MAKE ALL THE AMERICA HAPPY! ” " We apologize for any inconvenience our audience may have experienced yesterday on our Sesame Street YouTube channel ," read a message on the channel's home page , which appeared to have been restored around 11 a...
Expert Insights Articles Videos
Cybersecurity Resources