-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

WAVSEP 1.0.3 – Web Application Vulnerability Scanner Evaluation Project

WAVSEP 1.0.3 – Web Application Vulnerability Scanner Evaluation Project

Sep 16, 2011
WAVSEP   1.0.3 – Web Application Vulnerability Scanner Evaluation Project A vulnerable web application designed to help assessing the features, quality and accuracy of web application vulnerability scanners. This evaluation platform contains a collection of unique vulnerable web pages that can be used to test the various properties of web application scanners. Additional information can be found in the developer's blog . Project WAVSEP currently includes the following test cases: Vulnerabilities: Reflected XSS:   66 test cases, implemented in 64 jsp pages (GET & POST) Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST ) Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST ) Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST ) False Positives: 7 different categories of false positive Reflected XSS vulnerabilities (GET & POST ) 10 different categories o...
Balaji Plus Cloud Antivirus Released - Mix of 32 antivirus Engines for ultra Protection

Balaji Plus Cloud Antivirus Released - Mix of 32 antivirus Engines for ultra Protection

Sep 16, 2011
Balaji Plus Cloud Antivirus  Released - Mix of 32 antivirus Engines for ultra Protection Leo Impact Launch World first Antivirus scanning software which protects your PC from viruses, trojans, spyware, rootkits and other malicious programs (zero day exploits) by using 32+ antivirus on cloud. Most of time you can install and use only 2 to 3 antivirus in one system, not more so virus author bypass top antivirus but Balajiplus is Free service by Leo impact Security for Corporate Social Responsibility to protect your digital life using multiple antivirus scanners on cloud. Collective Intelligence, Balaji Antivirus Plus proprietary cloud-scanning technology that automatically collects and processes millions of malware samples, lies at the core of Balaji Cloud Antivirus. In recent comparative tests conducted by both AV-Test.org and AV-Comparatives.org, Balaji Antivirus Security's detection and protection scores rank consistently amongst the top security solutions. Balajiplus Clou...
THC-HYDRA v7.0 new version released for Download

THC-HYDRA v7.0 new version released for Download

Sep 15, 2011
THC-HYDRA v7.0 new version released for Download THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX. Official change log: New main engine for hydra: better performance, flexibility and stability New option -u – loop around users, not passwords Option -e now also works with -x and -C Added RDP module, domain can be passed as argument Added other_domain option to smb module to test trusted domains Small enhancement for http and http-proxy module for standard ignoring servers Lots of bugfixes, especially with many tasks, multiple targets and restore file Fixes for a few http-form issues Fix smb module NTLM hash use Fixed Firebird module deprecated API call Fixed for dpl4hydra t...
cyber security

Master High-Velocity Defense: SentinelOne's Virtual Cyber Threat Forum 2026

websiteSentinelOneCyber Resilience / Threat Intel
See Jayson E. Street deconstruct a bank breach and learn to hunt high-velocity threats at machine speed.
cyber security

99% of Mythos Findings Remain Unpatched. Defenders Are Building the Response

websitePicus SecurityAI Security / Security Validation
Autonomous Validation Summit, May 12 and 14. Register free and get 12 recommendations for the Mythos era.
uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware

uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware

Sep 14, 2011
uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware Attackers hijacked two popular Torrent websites "bittorrent.com and utorrent.com" and tampered with their download mechanisms, causing visitors trying to obtain file-sharing software to instead receive malware. The site reported on its blog  that the attack had occurred at around 04:20 Pacific Daylight Time (11:20 GMT) on Tuesday. Initially, the incursion was also thought to have affected the servers of the main BitTorrent site, but further investigation revealed this site had been unaffected by the attack. Once installed, Security Shield delivers false reports that a computer is infected with multiple pieces of malware and prompts the user for payment before claiming to disinfect the machine. The attack affected only users who downloaded and installed software from bittorrent.com and utorrent.com during the hour-and-fifty-minute window that the sites were compromised. Those who installed software pr...
Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran

Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran

Sep 14, 2011
Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran This book will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide the readers with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools. We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the-Middle attacks, creating Wi-Fi Honeypots and compromise networks running WPA-Enterprise mechanisms such as PEAP and EAP-TTLS. Even though touted as a Beginner's Guide, this book has something for everyone - from the kiddies to the Ninjas. You can purchase the book from: Global: http://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/ India: http://www.packtpub.com/backtrack-5-wireless-penetration-testi...
McAfee DeepSAFE - Anti-rootkit Security Solution

McAfee DeepSAFE - Anti-rootkit Security Solution

Sep 14, 2011
McAfee DeepSAFE - Anti-rootkit Security Solution McAfee previewed its DeepSAFE hardware-assisted security technology for proactively detecting and preventing stealthy advanced persistent threats (APTs) and malware. The technology, which was co-developed with Intel, sits below the OS, providing the ability to fundamentally change the security game, according to the companies. According to McAfee Labs, more than 1,200 new rootkits per day are detected - equating to 50 per hour every single day. The DeepSAFE technology, which was demonstrated at the Intel Developer Forum in San Francisco, was able to detect and stop a zero-day Agony rootkit from infecting a system in real time. This technology is expected to launch in products later in 2011. Key attributes of McAfee DeepSAFE: Builds the foundation for next-generation hardware-assisted security operating beyond the operating system Provides a trusted view of system events below the operating system Exposes many attacks that are un...
Presidential website president of Bolivia hacked

Presidential website president of Bolivia hacked

Sep 14, 2011
Presidential website president of Bolivia hacked The presidential website of Bolivia presidencia.gob.bo has been hacked. The hack has been carried out by twitter id: @SwichSmoke. The website data has been breached and has been data leaked.Hacker upload the dumps on Pastebin .
Top100 Arena Gaming Sites Network hacked By ACA [Albanian Cyber Army]

Top100 Arena Gaming Sites Network hacked By ACA [Albanian Cyber Army]

Sep 13, 2011
Top100 Arena Gaming Sites Network hacked By ACA [Albanian Cyber Army] Albania hackers have exploited one of the biggest Game Arena site   " Top100 " database using SQL injection attack. They leak the database on mediafire . Hackers belongs from group  ACA [Albanian Cyber Army] .
#Opiran new press release for 23 September by Anonymous Hackers

#Opiran new press release for 23 September by Anonymous Hackers

Sep 13, 2011
#Opiran new press release for 23 September by Anonymous Hackers [Salutation] To the Noble and Brave People of Iran and Syria, [Acknowledge plight] The people of Iran and Syria are still being caged, tortured and murdered. They are ruled by vile leaders, who seek not to protect, but to harm. Leaders who will stop at nothing to keep their power. [Statement of Facts and Outcomes] Iran deserves modern affortable energy and fair elections. The entire world speaks of the treachery of Iran's fraudulous regime. Newly secret US ambassadorial letters, released by WikiLeaks, confirm what you already know. [ irc.iranserv.com #opiran port 6697 ssl ] [Outline Client Condition] The people of Syria are beaten by regime police from Iran. The People of Syria are kept down by the regime of Iran, which backs the will of Assad to remain in power. No matter how many innocent victims fighting for freedom and social justice, this may cost. [Support] Ahmadinejad, Khamenei and Assad know th...
The Security Onion LiveDVD - Download

The Security Onion LiveDVD - Download

Sep 13, 2011
The Security Onion LiveDVD - Download The Security Onion LiveDVD is a bootable DVD that contains software used for installing, configuring, and testing Intrusion Detection Systems. It is based on Xubuntu 10.04 and contains Snort, Suricata, Sguil, Squert, Xplico, nmap, metasploit, Armitage, scapy, hping, netcat, tcpreplay, and many other security tools. Official change log for Security Onion 20110919: The “IDS Rules” menu now has a new entry called “Add Local Rules” which will open /etc/nsm/rules/local.rules for editing using the “mousepad” GUI editor. You can then add any rules that you want to maintain locally (outside of the downloaded VRT or Emerging Threats rulesets). A new menu called “IDS Config” was added with a new menu entry called “Configure IDS engine(s)”. This will list all of the IDS engines on your system and allow you to choose one to configure. It will then open the proper config file for whatever IDS engine you’re running. After you save and close the config f...
BruCON – Belgium’s First Security Conference

BruCON – Belgium’s First Security Conference

Sep 13, 2011
BruCON – Belgium’s First Security Conference BruCON, Belgium’s first security conference is back for it’s third edition on 19-22 September. After witnessing greater success in the past two years, this year’s event is expected to attract more then 400 people from around Europe. BruCON conference aims to create bridge between the various actors active in computer security world, included but not limited to hackers, security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies,academic researchers, etc. BruCON is organized as a non-profit event by volunteers. A group of security enthusiasts decided that it was time in Belgium to have its own security conference. A lot of countries around the world already had these kind of conferences to discuss and present research on computer security and related subject matters. This group of volunteers wanted Belgium not to be the last to have a similar conference. The event features more then 27...
Hook Analyser Malware Tool Released

Hook Analyser Malware Tool Released

Sep 13, 2011
Hook Analyser Malware Tool Released Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. The tool can hook to an API in a process and can do following tasks. 1. Hook to API in a process 2. Hook to API and search for pattern in memory of a process 3. Hook to API and dump buffer (memory). Download Here
Panda Security (Pakistan domain) hacked by X-NerD

Panda Security (Pakistan domain) hacked by X-NerD

Sep 11, 2011
Panda Security (Pakistan domain) hacked by X-NerD Panda Security, One of the famous Computer software company website got hacked. Pakistan domain of Panda Security hacked by Pakistani hacker " X-NerD ". Hacker is from Pakistan Cyber Army team of hackers. Taunt by hacker on deface page " OoooOOPss...I am ShockeD At YouR SecuritY..S3cuR!tY L3vEL Z3r0...YOu Dont KnoW HOw To SecurRe Your AsS n Pr0vidinG SEcurity to 0therS...Big LauGh... ". Yesterday X-Nerd was in news for hacking Hundreds of other domains. Mirror of hack on Zone-H .
Suggested The Linux 3.1 Kernel logo

Suggested The Linux 3.1 Kernel logo

Sep 11, 2011
Suggested The Linux 3.1 Kernel logo This new logo was proposed just this weekend and the current discussion to see whether it will be accepted for Linux 3.1 can be found in this LKML thread . To mark the upcoming release of the Linux 3.1 kernel IBM’s Darrick Wong has proposed changing the familiar solo-Tux logo to something more, well, befitting of the version number. This proposed logo for the Linux 3.1 kernel isn't to raise awareness for any animals or other causes. but to poke fun at Microsoft Windows 3.1. Darrick Wong of IBM has proposed replacing the Tux logo in the Linux 3.1 kernel with a new logo that makes mockery of Microsoft's Windows 3.1 operating system that began selling 19 years ago.
Truth Alliance Network and 20 Churches websites hacked by Muslim Liberation Army

Truth Alliance Network and 20 Churches websites hacked by Muslim Liberation Army

Sep 11, 2011
Truth Alliance Network and 20 Churches websites hacked by Muslim Liberation Army 20 Churches websites and Truth Alliance Network defaced by Muslim Liberation Army. Hacker with name "XtReMiSt" deface all these 21 websites and post above image and message on homepage as shown. Message posted by hackers " To Raise A Voice Against Quran Burning Day and Illegal occupation of Israel and India in Palestine and kashmir.. and to show why muslims are raising their voice against america....Message Delievered with peace... !!! " Further message posted by him : Sites like Church of God of North America, Legacy Church, First United Church of God, First Church of God Madisonville, First Baptist Church Hyannis, Meet the Pastors - First Church of God has been defaced. List of hacked sites is here .
Federal Nigerian Government Websites Hacked by Elemento_pcx & s4r4d0

Federal Nigerian Government Websites Hacked by Elemento_pcx & s4r4d0

Sep 11, 2011
Federal Nigerian Government Websites Hacked by Elemento_pcx & s4r4d0 Nigerian Government Websites defaced by hacker with name " Elemento_pcx & s4r4d0 ". Defacement page   contain the message " Fatal Error!by Elemento_pcx & s4r4d0 ..."Be yourself but not always the same" ... G. The Thinker ...Help? s4r4d0 [at] yahoo.com & elemento_pcx [at] yahoo.com.br ". Mirror of hack also posted to Zone-H .
Linux Foundation & Linux.com multiple server compromised

Linux Foundation & Linux.com multiple server compromised

Sep 11, 2011
Linux Foundation & Linux.com multiple server compromised The Linux Foundation has pulled its websites from the web to clean up from a “security breach". A notice posted on the Linux Foundation said the entire infrastructure including LinuxFoundation.org, Linux.com, and their subdomains are down for maintenance due to a security breach that was discovered on September 8, 2011. Multiple Servers that are part of the Linux Foundation & Linux.com infrastructure were affected during a recent intrusion on 8 September which " may have compromised your username, password, email address and other information ".  More from the Linux Foundation announcement: We are in the process of restoring services in a secure manner as quickly as possible. As with any intrusion and as a matter of caution, you should consider the passwords and SSH keys that you have used on these sites compromised. If you have reused these passwords on other sites, please change them immediately. ...
Hundreds of domains hacked by X-NerD hacker

Hundreds of domains hacked by X-NerD hacker

Sep 10, 2011
Hundreds of domains hacked by X-NerD hacker More than 250 websites are defaced by Pakistani hacker " X-NerD " and a custom page can be seen their at site/x.php . List and Mirror of all 250+ hacked sites are here .
The George Washington Institue for Sustainability hacked by Cocain TeaM

The George Washington Institue for Sustainability hacked by Cocain TeaM

Sep 10, 2011
The George Washington Institue for Sustainability hacked by Cocain TeaM The George Washington Institue for Sustainability website got hacked and defaced by Cocain TeaM hackers. Mirror of hack available on Zone-H . The George Washington University is located four blocks from the White House and was created by an Act of Congress in 1821. Today, GW is the largest institution of higher education in the nation's capital.
Rootkit Hunter - Rootkit scanning tool

Rootkit Hunter - Rootkit scanning tool

Sep 10, 2011
Rootkit Hunter - Rootkit scanning tool Rootkit scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: - MD5 hash compare - Look for default files used by rootkits - Wrong file permissions for binaries - Look for suspected strings in LKM and KLD modules - Look for hidden files - Optional scan within plaintext and binary files Download Rootkit Hunter
14 Years in Jail for mass credit card theft

14 Years in Jail for mass credit card theft

Sep 10, 2011
14 Years in Jail for mass credit card theft A 21 year old man received a 14 year prison sentenced on Friday for running an online business that sold counterfeit credit cards encoded with stolen account information with losses estimated at more than $3 million. Tony Perez III, of Hammond, Indiana, pleaded guilty to the charges on April 4. In his plea, Perez said he sold counterfeit credit cards encoded with stolen account information. Perez found customers through criminal "carding forums," Internet discussion groups set up to aid in the buying and selling of stolen financial account information and related services. When the US Secret Service raided his apartment in June 2010, they found data for 21,000 stolen credit cards and equipment needed to encode them onto blank cards. Credit card companies said losses from the card numbers in Perez's possession topped more than $3 million. In addition to the prison term, Judge Liam O'Grady of U.S. District Court for th...
NBC News Twitter account hacked & post fake news of 9/11

NBC News Twitter account hacked & post fake news of 9/11

Sep 10, 2011
NBC News Twitter account hacked & post fake news of 9/11 Hackers have broken into the Twitter account of NBC News and posted messages claiming that there has been a terrorist attack at Ground Zero in New York. Coming two days before the tenth anniversary of the 9/11 attacks, the prank by a group calling themselves the ' script kiddies ' was greeted with widespread opprobrium from other twitter users. " Breaking News! Ground Zero has just been attacked. Flight 5736 has crashed into the site, suspected hijacking. More as the story develops ," was the first tweet this afternoon. It was followed by two others, including one that started " This is not a joke ." The fourth tweet said " NBCNEWS hacked by The Script Kiddies. " Luke Russert, who covers politics for NBC News, also tweeted: " Please ignore NOT TRUE tweets coming from @NBCNews . We got hacked by tasteless despicable attention seeking criminals. " Some experts suspect that sc...
Google tells Iranians to Change their Gmail password

Google tells Iranians to Change their Gmail password

Sep 09, 2011
Google tells Iranians to Change their Gmail password Google is advising all its users in Iran to change their Gmail passwords, and check that their Google accounts have not been compromised.In a blog post , Google said that it was directly contacting users in Iran who may have been hit by a man-in-the-middle attack. The move follows the compromise of Dutch SSL certificate authority DigiNotar. Hackers created fake SSL certificate credentials for Google.com and many other domains. These fake Google credentials were used to run man-in-the-middle attacks against Gmail users in Iran, according to an examination of authentication look-ups logs at DigiNotar and other evidence. Specifically, Google recommends that users in Iran change their passwords; verify their account recovery options; check the Web sites and applications that are allowed to access their Google account; check Gmail settings for suspicious forwarding addresses or delegated accounts; and pay attention to warnings tha...
Norton Cybercrime Report 2011

Norton Cybercrime Report 2011

Sep 09, 2011
Norton Cybercrime Report 2011 For the first time a Norton study calculates the cost of global cybercrime: $114 billion annually.Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional $274 billion was lost. With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion). Read more on Norton
FBPwn : A Cross-Platform Facebook Profile Dumper tool

FBPwn : A Cross-Platform Facebook Profile Dumper tool

Sep 09, 2011
FBPwn : A Cross-Platform Facebook Profile Dumper tool FBPwn is an open source, cross-platform, Java based Facebook profile dumper. It can send friend requests to a list of Facebook profiles, and poll for their acceptance notification. Once the victim accepts the invitation, it dumps all their information, photos and friend list to a local folder. It supports a lot of modules that can expand its current functionalities. It has a well documented Wiki page explaining the process of building a FBPwn module. Though it has a lot of available modules prebuilt for your use. All modules work on a selected profile URL (we’ll call him Bob), using a valid authenticated account (we’ll call him Mallory). AddVictimFriends: Request to add some or all friends of Bob to increase the chance of Bob accepting any future requests, after he finds that you have common friends. ProfileCloner: A list of all Bob’s friends is displayed, you choose one of them (we’ll call him Andy). FBPwn will change Ma...
Wireshark 1.4.9 & Wireshark 1.6.2 updated version released

Wireshark 1.4.9 & Wireshark 1.6.2 updated version released

Sep 09, 2011
Wireshark 1.4.9 & Wireshark 1.6.2 updated version released Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: configure ignores (partially) LDFLAGS. (Bug 5607) Build fails when it tries to #include , not present in Solaris 9. (Bug 5608) Unable to configure zero length SNMP Engine ID. (Bug 5731) BACnet who-is request device range values are not decoded correctly in the packet details window. (Bug 5769) H.323 RAS packets missing from packet counts in “Telephony->VoIP Calls” and the “Flow Graph” for the call. (Bug 5848) Wireshark crashes if sercosiii module isn’t installed. (Bug 6006) Editcap could create invalid pcap files when converting from JPEG. (Bug 6010) Timestamp is incorrectly decoded for ICMP Timestamp Response packets from MS Windows. (Bug 6114) Malformed Packet in decode for BGP-AD update. (Bug 6122) Wrong display of CSN_BIT in CSN.1. (...
Google Web History vulnerable to new Firesheep Addon

Google Web History vulnerable to new Firesheep Addon

Sep 09, 2011
Google Web History vulnerable to new Firesheep Addon Two researchers have shown how a modded version of the Firesheep Wi-Fi sniffing tool can be used to access most of a victim’s Google Web History, a record of everything an individual has searched for. The core weakness discovered by the proof-of-concept attack devised by Vincent Toubiana and Vincent Verdot lies with what is called a Session ID (SID) cookie, used to identify a user to each service they access while logged in to one of Google’s services. Fortunately, the latest exploit does not allow attackers to take over Google Accounts, but obviously, it can be used to expose private data. " While the direct access to users' data is subject to a strict security policy, using personalized services (which may leak this same personal information) is not, " wrote Vincent Toubiana and Vincent Verdot, the creators of the modded Firesheep. To be sure, the compromised cookies are deployed across more than 20 websites inc...
Hotmail, MSN, Office 365, live.com sites down (now up)

Hotmail, MSN, Office 365, live.com sites down (now up)

Sep 09, 2011
Hotmail , MSN , Office 365 , live.com sites down (now up) A number of Microsoft online services, including Hotmail, MSN, Office 365, and seemingly most if not all of *.live.com addresses are currently “experiencing an outage”. MSN and Office 365 have already tweeted about it: The downtime, which happened on Friday at about 4am in the UK — 8pm on Thursday Pacific time (PDT) — was due to a domain name service problem, according to Microsoft. But Microsoft certainly isn't alone.Google has also seen its share of downtime. Just this past Wednesday, Google Docs was offline for about 30 minutes. In May, the company's Blogger service was unavailable for the greater part of a day.
URGE (Universal Rapid Gamma Emitter) Hijacking Twitter Trends Released by Anonymous

URGE (Universal Rapid Gamma Emitter) Hijacking Twitter Trends Released by Anonymous

Sep 09, 2011
URGE (Universal Rapid Gamma Emitter) Hijacking Twitter Trends Released by Anonymous Anonymous have created something called Universal Rapid Gamma Emitter, or more simply URGE, which hijacks Twitter trending topics, allowing Anonymous members and supporters to subvert the topic with their own embedded messages. Anonymous is calling it TwitterRaiding. Members of the group say that they are tired of constantly seeing trending topics that are redundant or related to pop culture and created this tool to help create more attention for topics that may have a wider meaning or different kind of impact on other Twitter users. In a statement, members say that, “ This is not a hacking tool nor is it an exploit tool .” A press release on URGE states: To the people of the interwebz, We recently have become tired of seeing trending topics on twitter that were redundant and “pop culture” like. We have also grown tired of Twitter not trending hash tags that actually serve a cause and mean somet...
20000 patient records Breach at Stanford Hospital

20000 patient records Breach at Stanford Hospital

Sep 09, 2011
20000 patient records Breach at Stanford Hospital Last month Stanford University's hospital discovered a massive privacy breach when 20,000 emergency room records appeared online. The records included names, diagnosis codes, account numbers, dates of admission and discharge, and billing charges. Social Security numbers, birth dates, credit card accounts or other information that could potentially result in identity theft was not exposed. Even so, the hospital is offering free identity-protection services to all affected patients. The Hospital released the following statement: " An electronic file that an outside vendor’s sub-contractor created and caused to be posted to a website contained limited information about patients seen in the Emergency Department of Stanford Hospital & Clinics between March 1 and August 31, 2009. The Hospital discovered this on August 22, 2011, and immediately took action to ensure removal of the file from the website, which was done within 24...
Hacker Halted USA 2011 - 10 Reasons Why You Should Attend

Hacker Halted USA 2011 - 10 Reasons Why You Should Attend

Sep 08, 2011
Hacker Halted USA 2011 - 10 Reasons Why You Should Attend Hacker Halted is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers. Hacker Halted returns to Miami for the 3rd year in a row will be held in Miami on 25th and 27th October 2011. Participate and be part of one of the world’s most recognized information security conference. Gain perspective through keynote addresses on the current state of information security as well as emerging trends and threats. An information security conference with a comprehensive agenda. Choose from the various focused tracks covering critical domains of information security. Match your informati...
winAUTOPWN v2.7 – Windows Autohacking Tool

winAUTOPWN v2.7 – Windows Autohacking Tool

Sep 08, 2011
winAUTOPWN v2.7 – Windows Autohacking Tool This version covers almost all remote exploits up-till mid-July 2011 and a few older ones as well. This version incorporates a few new commandline parameters: -perlrevshURL (for a PERL Reverse Shell URL), – mailFROM (smtpsender) and -mailTO (smtpreceiver). These are the commandline arguments required for a few exploits which require remote connect-back using a perl shell and email server exploits requiring authentication respectively. This version also tackles various internal bugs and fixes them. A complete list of all Exploits in winAUTOPWN is available in CHANGELOG.TXT A complete list of User Interface changes is available in UI_CHANGES.txt Also, in this version : BSDAUTOPWN has been upgraded to version 1.5. In this release you will also find pre-compiled binaries for : FreeBSD x86 FreeBSD x64 DragonFly BSD x86 Download winAUTOPWN v2.7
Sony Hires Ex- Homeland Security Official after PlayStation Hack

Sony Hires Ex- Homeland Security Official after PlayStation Hack

Sep 08, 2011
Sony Hires Ex- Homeland Security Official after PlayStation Hack Sony has hired a former official at the US Department of Homeland Security for the new post of chief information security officer, months after a massive hacking attack leaked information on 100 million user accounts on its games networks. Philip Reitinger, formerly the director of Homeland Security's National Cyber Security Center, will join Sony in the newly created position of chief information security officer and a senior vice president. The new hire signals a heightened seriousness by Sony in the aftermath of an intrusion into its online videogame service earlier this year. The breach compromised the personal information of more than 100 million accounts from its online networks, including the possible loss of some credit card information. Sony said there have been no reports of any credit card data theft. Sony shut down the PlayStation Network and Qriocity streaming video and music network on April 20...
12 Pakistan Government departments websites & Benazir Bhutto site Hacked by Mr52

12 Pakistan Government departments websites & Benazir Bhutto site Hacked by Mr52

Sep 08, 2011
12 Pakistan Government departments websites & Benazir Bhutto  Hacked by Mr52 An Indian Hacker " Mr52 " strike back to Pakistan Government departments. He hack and deface about 12 Government departments websites including Pakistan Navy, Maritime Security Agency, NATIONAL EDUCATION ASSESSMENT SYSTEM, Benazir Bhutto, Ministry of Foreign Affairs websites are hacked. List of defaced sites are : http://www.paknavy.gov.pk/securite/default.html http://www.paknavy.gov.pk/default.html http://www.msa.org.pk/default.html http://www.neas.gov.pk/default.html http://www.nfdc.gov.pk/default.html http://www.niopk.gov.pk/default.html http://www.szab.pk/default.html http://www.benazir.pk/default.html http://www.mopw.gov.pk/default.html http://www.dfp.gov.pk/default.html http://www.erapixels.com/default.html http://www.mofa.gov.pk/default.html
Offline Windows Analysis and Data Extraction (OWADE) - Forensics tool to expose all your online activity

Offline Windows Analysis and Data Extraction (OWADE) - Forensics tool to expose all your online activity

Sep 08, 2011
Offline Windows Analysis and Data Extraction (OWADE) - Forensics tool to expose all your online activity Researchers " Elie Bursztein " from Stanford University in California have managed to bypass the encryption on a PC's hard drive to find out what websites a user has visited and whether they have any data stored in the cloud. " Commercial forensic software concentrates on extracting files from a disc, but that's not super-helpful in understanding online activity ," says Elie Bursztein, whose team developed the software. " We've built a tool that can reconstruct where the user has been online, and what identity they used. " The open-source software, Offline Windows Analysis and Data Extraction (OWADE), was launched at the Black Hat 2011 security conference and works with PCs running on the Windows operating system. OWADE is in alpha version and is only available by checking out the code directly as we update it very frequently. Note th...
Court grants bail to Anonymous and LulzSec suspects

Court grants bail to Anonymous and LulzSec suspects

Sep 08, 2011
Court grants bail to Anonymous and LulzSec suspects Four alleged UK hackers suspected of being linked to attacks by hacking groups Anonymous and Lulz Security (LulzSec) have been released on bail after a hearing at Westminster magistrates court on the condition that they did not use specific online nicknames on the internet or IRC. 20-year-old Christopher Jan Weatherhead, from Northampton, cannot use the internet nickname ' Nerdo ', Ashley Rhodes, 26, from London, is banned from calling himself ' NikonElite ' online. Two other men, aged 24 and 20, have been released on bail following their arrest last week as part of the Metropolitan police investigation into Anonymous and LulzSec. They are due to return to a London police station in November.The two men were arrested separately in South Yorkshire and Wiltshire . They are charged with conspiring to commit offences under the Computer Misuse Act 1990.
Cyberwar between Israel and Turkish Hacker

Cyberwar between Israel and Turkish Hacker

Sep 06, 2011
Cyberwar between Israel  and Turkish  Hacker Turkish hacker " TurkGuvenligi " hijacked some 350 Israeli websites on Sunday evening, launching a Domain Name System (DNS) attack on at least seven high-profile websites including The Telegraph, Acer, National Geographic, UPS and Vodafone as well. Visitors to some of the sites were diverted to a page declaring it was “ World Hackers Day. " Hackers calling themselves the " TurkGuvenligi group " calimd the cyber-attack. "TurkGuvenligi translates as " Turkish security. " " The hack represents a 10%-15% spike compared to the average number of daily hacks of Israeli websites ," Shai Blitzblau, head of Maglan-Computer Warfare and Network Intelligence Labs, explained. Israel's military and security establishment has invested significantly in cyber-warfare programs in recent years and is considered one of the most advanced cyber-warfare forces in the world, both in attack and defense modes.T...
Malcon 2011 - Call for Papers

Malcon 2011 - Call for Papers

Sep 06, 2011
Malcon 2011 - Call for Papers Malcon is the worlds first platform bringing together Malware and Information Security Researchers from across the globe to share key research insights into building and containment of the next generation malwares . Call for Papers: Malcon 2011 are looking for new techniques, tool releases,unique research and about anything that’s breath-taking, related to Malwares. The papers and research work could be under any of the broad categories mentioned below : Hacking Tools: Phishing Kits, code that aids any malware or malicious activity is welcome. Malwares: Rootkit, Trojan, Botnet, Bootkit, Virus, Keylogger, Virtual Machine based Malware, Mobile OS Based Malware (Android, Symbian, IPhone etc.) Malware creation tools: Toolkits to create any kind of malware Web based malwares: Web-Shells, Browser Runtime Malwares (Javascript, Flash) Malware Infection and propagation methodologies: Emerging Infection techniques, Intelligent target enumeration te...
Ghana Red cross website defaced By Ahmdosa Hacker

Ghana Red cross website defaced By Ahmdosa Hacker

Sep 06, 2011
Ghana Red cross website defaced By Ahmdosa Hacker Tunisian Hacker Ahmdosa hack the official website of Ghana Redcross and deface it.Mirror of hack also submitted to Zone-H .
100's of United Kingdom and USA websites hacked by Dinelson

100's of United Kingdom and USA websites hacked by Dinelson

Sep 06, 2011
100's of United Kingdom and USA websites hacked by Dinelson Not only the Anonymous , Lulzsec or ComodoHacker are Active, Here on The Hacker News you will find   about every Hacker , from all over world who are daily Breaching Security of various Servers, Networks and sites one by one.  Today  Dinelson hacker deface 113 United Kingdom and USA websites and put a very impressive background Audio message on sites.
Registry Decoder - Digital Forensics Tool

Registry Decoder - Digital Forensics Tool

Sep 06, 2011
Registry Decoder - Digital Forensics Tool Digital forensics deals with the analysis of artifacts on all types of digital devices. One of the most prevalent analysis techniques performed is that of the registry hives contained in Microsoft Windows operating systems. Registry Decoder was developed with the purpose of providing a single tool for the acquisition, analysis, and reporting of registry contents. Download Here
💡 Expert Insights Articles Videos
🛠️ Cybersecurity Resources