-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

The Real Story Behind The Hacking Of Plentyoffish !

The Real Story Behind The Hacking Of Plentyoffish !

Feb 04, 2011
This story was sent to us by email from Luca Fenochietto himself, in which he tries to get his side of the story out there which may well be the truth. The full story goes like this: The Last Friday 21st January, Christian Russo and his partner Luca Fenochietto discovered a vulnerability in  PlentyOfFish  exposing users details, including usernames, addresses, phone numbers, real names, email addresses, passwords in plain text, and in most of cases, paypal accounts, of more than 28,000,000 (twenty eight million users). This vulnerability was under active exploitation by hackers. Their team decided to notify Mr. Markus Frind (founder and CEO of PlentyOfFish Inc.) about these circumstances as soon as possible in order to stop any potential damage which could be done, by the exploitation of this vulnerability. The flaw was reported the same night to Annie Kanciar, his wife, who was very thankful with us, and contacted one of their developers in order to infor...
"The Daily" Hacked, Unauthorized Web Index Created !

"The Daily" Hacked, Unauthorized Web Index Created !

Feb 04, 2011
One affair about The Daily that ashamed me from the additional I aboriginal laid eyes on the iPad bi-weekly that launched bygone is that there is no one abode area you can see a simple account of every news in the issue. There is a table of contents, but it shows alone ten featured stories. Like any acceptable hack, The Daily: Indexed creates a affection that is missing from the aboriginal but is acutely needed. The Tumblr blog put calm by Andy Baio creates a complete table of capacity for The Daily. The Daily: Indexed is causing a activity because The Daily is a subscription-only advertisement meant to be apprehend on the iPad. The Daily’s website is not abundant added than brochureware for the iPad app at this point, but there is a backdoor to every story. Whenever a subscriber shares a news via email, Twitter, or Facebook from their iPads—like this one about Amish raw milk smugglers—the recipients get a articulation to the news on thedaily.com. You can’t acquisition these belief b...
Flickr accidentally deletes photos of 3,400 user’s permanently !

Flickr accidentally deletes photos of 3,400 user’s permanently !

Feb 04, 2011
Flickr initially said that it had assuredly deleted Mirco Wilhelm's five-year old account, but a day afterwards said that it has absolutely adequate the photo collection. It’s every Flickr user’s affliction nightmare: one day you login to acquisition your accumulating of bags of anxiously organized photos acquire vanished. Permanently. That’s absolutely what happened this anniversary to Mirco Wilhem. When Wilhelm, a five-year affiliate of the Yahoo-owned photo-sharing website, approved to log in to his annual he was denied admission and instead prompted to actualize a fresh account. An e-mail from Flickr eventually accepted his fears: Hello, Unfortunately, I have mixed up the accounts and accidentally deleted yours. I am terribly sorry for this grave error and hope that this mistake can be reconciled. Here is what I can do from here: I can restore your account, although we will not be able to retrieve your photos. I know that there is a lot of history on your account–again, pl...
cyber security

Master High-Velocity Defense: SentinelOne's Virtual Cyber Threat Forum 2026

websiteSentinelOneCyber Resilience / Threat Intel
See Jayson E. Street deconstruct a bank breach and learn to hunt high-velocity threats at machine speed.
cyber security

99% of Mythos Findings Remain Unpatched. Defenders Are Building the Response

websitePicus SecurityAI Security / Security Validation
Autonomous Validation Summit, May 12 and 14. Register free and get 12 recommendations for the Mythos era.
Facts : Facebook is more addictive than sex and cigarettes !

Facts : Facebook is more addictive than sex and cigarettes !

Feb 04, 2011
A small study by a trending company shows that Facebook addiction is one of the fastest growing searches related to addiction. It is more popular than searches for sex or cigarette addiction. While we already knew that social networks like Facebook produce drugged-up, sex-crazed teenagers, new research shows that Facebook addiction may be soon be more prevalent than offline addictions like sex. The Internet Time Machine, a company that searches for trends across the Web through its extensive cloud computing network, is reporting that Facebook may be more popular than sex. Addiction to social media, specifically Facebook, is one of the top ranked digital addictions, says the trending company. More people are searching for help with Facebook addiction than sex addiction. “The rise of social media and the fear/need to be in constant contact with status updates and tweets has created a problem for people with addictive personalities,” says ITM. “The fact that accessing Facebook is so...
Local Training Center, Hacker University, 8 in the USA Participate in Global Launch of Certified Ethical Hacker version 7

Local Training Center, Hacker University, 8 in the USA Participate in Global Launch of Certified Ethical Hacker version 7

Feb 04, 2011
450 Global Training Centers Nominated, 25 Selected Worldwide, 8 in the USA, 1 in St. Louis (February 2, 2011) St.  Louis, MO – Hacker University is pleased to announce it has been asked by EC-Council, the leading international certification body in information security, to participate in the Global Launch of CEH v7 - the most advanced information security and ethical hacking training program in the world which is not yet publicly available. Only 15 students will be allowed to attend this exclusive, cutting-edge class the week of March 14, 2011 in St. Louis – becoming one of the world’s first CEH v7 certified professionals. Hacker University’s Global Launch instructor and co-owner, Dave Chronister, is thrilled to be a part of this revolutionary event. “I am excited at the universal recognition this event brings the city of St. Louis as well as Hacker University. CEH version 7 breaks away from its earlier releases with more emphasis on techniques and methodologies hackers use to...
Social gaming Website Zynga Hacked, $12 million worth Poker chips Stolen !

Social gaming Website Zynga Hacked, $12 million worth Poker chips Stolen !

Feb 03, 2011
Apparently, one guy managed to hack into social gaming giant Zynga. It transferred 400 billion (!) Poker chips virtual about him and began to sell on the black market. (Yes, apparently, is there a black market for virtual Zynga Poker Chips.) They were worth about $ 12 million. This is how the man was called and has since pleaded guilty and will probably serve a long prison sentence (he was on parole for a first offense of piracy related). Interestingly, there was a debate in the British court, where he was prosecuted for piracy, which is really the flight because of poker chips are good virtual, virtual, and Zynga can create as many as he wants. The Court responded by saying that yes, virtual goods are treated as property and add chips to your account amounts to theft. What we want to know is how the guy managed to hack Zynga, and what they do to ensure it does not recur. We asked for details Zynga and will keep you updated if we learn more. We just ask rogue hackers do not disru...
Google bets $20000 that Chrome browser can not be hacked !

Google bets $20000 that Chrome browser can not be hacked !

Feb 03, 2011
Google will pay $ 20,000 for the first scientist who succeeds in its Chrome browser to exploit this year's competition Pwn2Own piracy. The price is the largest ever to face the annual challenge, which begins for the fifth time in the CanSecWest security conference in Vancouver, British Columbia, March 9. In Pwn2Own this year, researchers sky exploits against machines running Windows 7 or Mac OS X, as they try to download Microsoft Internet Explorer, Mozilla Firefox, Apple Safari and Chrome. The researchers first to hack IE, Firefox and Safari will receive $ 15,000 and the computer running the browser. Prices are $ 5,000 higher than those given for the use of browsers in the last contest Pwn2Own, and three times the 2009 price. "We've raised the bar this time and the total allocated to cash prices rose to a whopping $ 125,000," said Aaron Portnoy, director of HP TippingPoint Security Research Team. TippingPoint, which is once again sponsoring Pwn2Own, set th...
Uttar Pradesh ATS To Investigate The Hacking of Gramin Bank Website !

Uttar Pradesh ATS To Investigate The Hacking of Gramin Bank Website !

Feb 03, 2011
Uttar Pradesh Anti Terrorist Squad will investigate piracy Ballia-Etawah Gramin Bank site would have been committed by a Pakistani organization, a police official said today. The survey was delivered to the ATS unit Varanasi as it was a case of cyber crime and there is a suspicion on the involvement of hackers based in Pakistan, said district SP Ram Swaroop here. A message was posted to the website of the bank for a night of self-proclaimed Pakistan. "The bank's site has been hacked ... This is just a trailor ... I'll show you a perfect film," the website message-balls Etawah graminea Bank said, according to police. . "We Luv break the tight security, therefore, the hackers were invited to the Indians ... my next bank target sites if you can not store Gud Luck -.. cyber barrier of Pakistan," the message said. anonymous caller informed the Director-General and banking graminea, Anil Prakash on the message on its website.
WikiLeaks nominated for Nobel Peace Prize,Truth is the most powerful weapon against Injustice ! !

WikiLeaks nominated for Nobel Peace Prize,Truth is the most powerful weapon against Injustice ! !

Feb 03, 2011
A Norwegian politician said he called Wikileaks for the Nobel Peace, referring to the site's contribution to "democracy and freedom" around the world. Nominations for the price of peace is closed Tuesdays. Any beneficiary legislator, academic or award in the world can nominate anyone for the price, according to the website of the Prize. Storting parliament Snorre Valen Wikileaks said on condition that contributed to "draw a map of the freedom of information." "Xiabao Liu was awarded the Nobel Peace Prize last year, fought for human rights, democracy and freedom of expression in China," Valen wrote on his blog. "Similarly, Wikileaks took part in the battle those same values throughout the world, exposing (among many other things), corruption, war crimes and torture." Wikileaks is a site that publishes documents concerning its business and neglect of the government. Critics have accused of endangering national security, while the defen...
Hackers Shut Down Egyptian Government Sites !

Hackers Shut Down Egyptian Government Sites !

Feb 03, 2011
The online accumulation Anonymous said Wednesday that it had bedridden the Egyptian government’s Web sites in abutment of the antigovernment protests. Anonymous, a about authentic accumulation of hackers from all over the world, aggregate about 500 supporters in online forums and acclimatedcomputer application accoutrement to accompany bottomward the sites of the Ministry of Information and President Hosni Mubarak’s National Democratic Party, said Gregg Housh, a affiliate of the accumulation who disavows any actionable action himself. The sites were bare Wednesday afternoon. The attacks, Mr. Housh said, are allotment of a added attack that Anonymous has army in abutment of the antigovernment protests that accept confused the Arab world. Aftermost month, the accumulation shut bottomward the Web sites of the Tunisian government and banal barter in abutment of the insurgence that affected the country’s dictator, Zine el-Abidine Ben Ali, to flee. Mr. Housh said that the accumulation ...
Bing caught copying search results from Google !

Bing caught copying search results from Google !

Feb 02, 2011
In a case of Internet espionage that makes the antics of double agent Cold War operatives seem like frivolous child play, Bing has been caught stealing search results from Google with its Bing toolbar and IE8's Suggested Sites feature. Google first suspected foul play in May 2010. By October 2010, with Bing results beginning to look uncannily like Google's, it knew something had to be done about it -- and so, in true, nerdtastic style, Google set up a sting to prove that Microsoft was actually behind the wholesale mimicry of Google's search results.   One of Google's 'sting' queries A few days later, the same result on Bing Google injected "synthetic" results into its search engine -- fake queries and results that no real user or engine would ever generate. Then, on D-Day, December 17, about 20 Google engineers were asked to run the test queries with Internet Explorer 8, Bing Bar and Suggested Sites. By December 31, some of these fake results beg...
Get Free CEH V7 Training via EC-Council to 375 selected professionals around the world !

Get Free CEH V7 Training via EC-Council to 375 selected professionals around the world !

Feb 02, 2011
How to get FREE CEH V7 Training? EC-Council is going to be selecting 125 information security professionals from all over the world to be part of the inaugural CEH V7 launch for FREE ! That’s right, you heard it right. It is Absolutely Free ! You can be one of the 125 Information Security Professionals who would be granted FREE Seats for the upcoming Launch Class of CEH v7. All you need is register at https://eccouncil.wufoo.com/forms/ceh-v7/. In 50 words, tell us why you should be selected ( Tip : Tell you the certifications you hold, the job you do, the company you work for and how this class will benefit you) Only the BEST would be selected, so make sure your application stands out from the crowd. As only 125 profesionals from all over the world will qualify, make your application early! Applications are open until 12 p.m. EST, on the 6th of February, 2011. All successful candidates shall be notified by February 14th, 2011. Benefits: The winners are entitled to other benef...
Indian Army blames Facebook for Violence in Kashmir !

Indian Army blames Facebook for Violence in Kashmir !

Feb 02, 2011
The Indian Army believes that arch amusing networking armpit Facebook has played a key role in annoying abandon in Jammu & Kashmir. According to the Army, Facebook and some added amusing networking sites are actuality acclimated to advance abrogating attack adjoin the Army and added aegis agencies. S A Hasnain, General Officer Commanding of the Srinagar-based 15 Corps bidding his apropos while acclamation the mediapersons at an Army action at Khanabal in South Kashmir. The acceleration of amusing media has already brought anarchy in abounding countries, including Egypt. The Army believes that these amusing media sites may afflict the accord and accord in the basin in future.
Breaking News : Google offers "speak-to-tweet" Account to Egyptians !

Breaking News : Google offers "speak-to-tweet" Account to Egyptians !

Feb 02, 2011
Google in aggregate with micro-blogging armpit Twitter has offered a fresh account for tweeting after an internet connection. The account "speak-to-tweet" allows Egyptian users to leave voice-mail bulletin that will be angry into tweets. According to a description on Google's blog, the account has been advised accurately for users in Egypt who are clumsy acquaint through internet with others due to advancing abandon in the country. The fresh account "speak-to-tweet" allows anyone to punch any three all-embracing numbers and leave articulation messages. The letters will be automatically beatific out as tweets with #egypt. The numbers are +16504194196 or +390662207294 or +97316199855 that will advice Egyptians to break in blow after internet connection.
Anonymous Hackers Providing Communication Tools For Egyptian People !

Anonymous Hackers Providing Communication Tools For Egyptian People !

Feb 02, 2011
"Internet not working, badge cars burning," beatific out one Egyptian. "Today marks a abundant day for Egypt," beatific out another. These letters weren't advancing from adaptable phones or computers, but from an abecedarian radio sending out Morse Code about amidst the anarchy in Egypt. The Egyptian government's efforts to absolute communications aural the country has triggered a beachcomber of activism from an all-embracing accumulation of chargeless accent activists on the Internet alleged Telecomix. Organizing application babble rooms, wikis, and collaborative autograph tools, this abundantly bearding accumulation has formed to acquaint Egyptians about their communications options while accepting admission letters from them. Telecomix has ahead formed on chargeless accent efforts in Tunisia, Iran, China and added countries who accept approved to abridge or block genitalia of the Internet. Egypt has been articular as a "top priority" for...
Xtremeroot.net hacked by BoxHead (Belegit Network)

Xtremeroot.net hacked by BoxHead (Belegit Network)

Feb 02, 2011
Xtremeroot.net hacked by BoxHead (Belegit Network) Link :  www.xtremeroot.net/ofsec/ News Source : Ketan Singh
DHS Investing $40 Million for Cybersecurity Research !

DHS Investing $40 Million for Cybersecurity Research !

Feb 02, 2011
Insider threats, botnets and malware, and assay to abutment the Comprehensive Civic Cyber Initiative (CNCI) are amid areas of cybersecurity advance the Department of Homeland Aegis (DHS) will accomplish in budgetary year 2011. The DHS Science and Technology Homeland Aegis Advanced Assay Projects Bureau (HSARPA) is gluttonous proposals on 14 areas of cybersecurity assay it affairs to focus on this year, bristles of which will accord to the CNCI, a alternation of efforts to accommodate front-line aegis adjoin cybersecurity threats, according to a Broad Bureau Announcement acquaint on FedBizOpps.gov. The absolute amount of the accretion is $40 million. The DHS has been advance in cybersecurity for a brace of years through HSARPA, and this year shows the bureau absorption on both acceptable methods of aegis such ascomputer application assurance, enterprise-level aegis metrics, and arrangement resiliency, as able-bodied as added forward-thinking areas of assay such as authoritative aegi...
US recruiting young cyber warriors !

US recruiting young cyber warriors !

Feb 02, 2011
The United States is attractive for the abutting bearing of cyber warriors. The US Cyber Challenge Cyber Foundations competition, kicked off this anniversary by the nonprofit Centermost for Internet Aegis , is out to acquisition 10,000 acceptance with the abeyant to become "top accoutrements in cybersecurity." "The charge to acquisition artistic solutions to attention our advice systems and agenda basement has never been greater," said centermost arch controlling William Pelgrin. "The Cyber Foundations antagonism will advice us tap into the amazing aptitude beyond our nation's schools to analyze those with a affection for aegis and a admiration to put their abilities to acceptable use," he continued. The antagonism consists of a alternation of timed quizzes to analysis aerial academy acceptance in computer science categories advised key to attention networks and systems. Top-scoring acceptance will get status, prizes, and introductions to gov...
British antic Matt Lucas Twitter Hacked !

British antic Matt Lucas Twitter Hacked !

Feb 01, 2011
British antic MATT LUCAS has hit aback at accusations he has been autograph letters on Twitter.com while drunk, insisting his annual was afraid this anniversary (beg31Jan11). The Alice In Wonderland star's folio was adapted with several camp posts on Monday night (31Jan10), abrogation admirers assertive he had advantaged in booze afore hitting the web. The teetotal antic woke up on Tuesday (01Feb11) to acquisition a cord of replies from afraid followers and he appear an actor had taken ascendancy of his account. He writes, "Good morning all. Um, my Twitter annual was afraid aftermost night, so avoid any Tweets beatific because they didn't appear from me! "Thanks for your accusations that I was drunk. I'm teetotal. The aberration I fabricated was not logging out of my computer!"
FBI raids on 40 Anonymous hackers !

FBI raids on 40 Anonymous hackers !

Feb 01, 2011
The FBI would have conducted 40 raids yesterday and seized the computers of members of the loosely organized group of hackers known as Anonymous. Several members have posted their stories in online forums, including images of kicking in doors. The FBI has seized every computer in every house and other electronic devices such as game consoles and iPhones. The reports may be exaggerated, but the FBI has issued 40 orders in the case. The FBI was gathering evidence on the group's refusal of service attacks against Visa, MasterCard, PayPal and Amazon. The group has launched attacks in retaliation for actions against Wikileaks site, which has published thousands of documents from the United States filed in December. Denial of service attacks are frustrating for victims and may also cause real economic damage. They are also against the law and raids. But Anonyme allegedly political reasons in the raid. The group said in a press statement that the denial of service attacks have bee...
Poll Results : Prefer way b/w Whitehats & Blackhats ?

Poll Results : Prefer way b/w Whitehats & Blackhats ?

Feb 01, 2011
Poll Results :  Question : With whom/as whom you will Prefer to work ? a) Registered WhiteHat Hackers b) Unregistered BlackHat Hackers We have Total 457 Votes in 15 Days on our Sites. Finally today the result is out, and  Registered WhiteHat Hackers won by 72% Votes (331 Votes) , where  Unregistered BlackHat Hackers got 27% Votes (126 Votes) In last 15 days of open Voting. Thank you friends for voting and participating in this event of " The Hacker News " :D
AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

Feb 01, 2011
AVG Technologies, developers of the world's best accepted chargeless anti-virus software, appear today that it has teamed up with Netlog to barrage a co-branded Aegis Center aural the accepted European amusing arrangement now accessible at http://www.netlog.com/go/helpdesk/security/. The Aegis Center powered by AVG, will acquaint and brainwash users about Internet security, accommodate tips and advice users assure themselves from malware, spyware and added attacks by cybercriminals while they cream online. Additionally, all links aural Netlog will be automatically scanned by AVG LinkScanner, admonishing users to burden from aperture a articulation back a blackmail is detected. With added than 72 actor associates and over 150 actor visitors per month, Netlog is one of the fastest-growing and best accepted amusing networking sites amidst European adolescence amid the ages of 18 and 25. The Aegis Center will be initially formed out to 24 actor Netlog users in the top six countries of...
SourceForge Detects Targeted Attack, Resets Millions of Passwords !

SourceForge Detects Targeted Attack, Resets Millions of Passwords !

Feb 01, 2011
Last week, accessible antecedent computer application development and administration ability SourceForge the ambition of a directed attack. Once the advance was detected, the aggregation bound bottom ward the impacted hosts to abate the accident of accretion to added hosts. Thus, this prevented accessible abstracts acquisition activities, said SourceForge. was Consequently, it resulted in annual blow for CVS Hosting, ViewVC, Fresh Release upload capability, and ProjectWeb/shell. According to SourceForge, the aggregation assay baldheaded (among added things) a afraid SSH daemon, which was adapted to do countersign capture. Even admitting the aggregation has no affirmation to advance that the sniffing advance was acknowledged in accession passwords, it is demography a basic admeasurement of abandoning all SourceForge user annual passwords. “What we absolutely don’t appetite is to acquisition out in two months that passwords were compromised and we didn’t booty any action,” as per t...
New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

Feb 01, 2011
Sony’s been arena cat-and-mouse with PS3 firmware crackers, and beneath than a day afterwards its adaptation 3.56 firmware was released, hackers accept baffled Sony’s locks. If you’ve gotten acclimated to accepting custom firmware on your Sony PlayStation 3, the association over at KaKaRoToKS, accepted for custom PS3 firmware, accept absurd the most recent firmware (version 3.56) appear by Sony in beneath than 24 hours afterwards the update’s release. While Sony’s been attempting to abolish any fresh versions of custom 3.56 firmware via DMCA appraisal notices from Github, you can still get a authority of the most recent custom firmware (failOverFlow) done up by KaKaRoToKS over at Gitorious. The advantage abaft custom firmwares (some custom firmwares don’t acquiesce you to charlatan games) is that they acquiesce you to install your own amalgamation files like the ones from Sony’s PSN.
B.C. dating website hacked !

B.C. dating website hacked !

Feb 01, 2011
A hacker bankrupt into the online dating website Plenty of Fish aftermost week, auspiciously exporting hundreds of accounts. Markus Frind, CEO of the Vancouver-based company, said Monday all passwords accept been displace back the Jan. 18 aegis breach. He additionally said all annual users accept been contacted. However, in a blog column Monday, he accustomed 345 accounts were auspiciously exported. Steffani Cameron has had an annual with Plenty of Fish for four years. She affairs to annul her annual because she doesn't assurance the company's aegis measures. "When I was accepting my account chump affliction email, they were saying, 'You've got added matches and actuality is your password.' Anybody who sends passwords unencrypted in apparent argument in an email has some austere issues with compassionate what aegis absolutely means," she said. Approximately 28 actor bodies accept logged assimilate the Plenty of Fish website back its inception. I...
WikiLeaks 'hacktivists' acknowledge war on the UK !

WikiLeaks 'hacktivists' acknowledge war on the UK !

Feb 01, 2011
Anonymous, the "hacktivist" aggregate abaft a alternation of pro-WikiLeaks cyber attacks, has declared war on the British Government afterward the arrest of bristles of its associates in the UK. In a account acquaint online, the organisation apprenticed supporters to hit Government websites with broadcast abnegation of account (DDoS) attacks – a way of calamity a ambition website with so abounding requests for advice that it is affected to shut down. The tactic has been acclimated by Anonymous activists with arresting success in the accomplished two months to briefly attenuate the websites of banking institutions or governments which accept criticised WikiLeaks in the deathwatch of the advertisement of bags of abstruse US admiral cables. The alarm to accoutrements raises the bogey of co-ordinated cyber attacks on Government online infrastructure. It has been advised austere abundant for GovCertUK, the advice aegis agency, to acquaint government websites to booty precaut...
Union leader Crow claims phone was hacked !

Union leader Crow claims phone was hacked !

Feb 01, 2011
Firebrand abutment baton Bob Crow on Monday became the best recent accessible amount to accuse to the badge that his buzz has been afraid by journalists. Lawyers for Bob Crow, general-secretary of the Rail, Maritime and Carriage Workers' union, accept accounting to London's Metropolitan Badge allurement them to delving suspicions that his buzz ability accept been targeted as continued ago as 2000. "RMT has had suspicions that journalists may accept had admission to clandestine advice about my movements and my union?s activities that date aback to the year 2000," Crow said. "We are now allurement for the police, as allotment of their renewed investigation, to acknowledge to us any affirmation or advice that they may accept baldheaded in account of the Account of the World." Police launched a beginning analysis into buzz hacking by journalists at the Rupert Murdoch-owned Account of the World Sunday abridged aftermost anniversary afterwards accepting ...
Expert Insights Articles Videos
Cybersecurity Resources