-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Cyber Espionage Campaign Targets Israel and Palestine

Cyber Espionage Campaign Targets Israel and Palestine

Nov 12, 2012
Multiple malware attacks against both Israeli and Palestinian systems, likely to be coming from the same source, have been seen over the last year. Researchers in Norway have uncovered evidence of a vast Middle Eastern espionage network that for the past year has deployed malicious software to spy on Israeli and Palestinian targets. Israel has banned its police force from connecting to the Internet and from using memory sticks or disks in an effort to curb a cyberattack. The ban, enacted last week, is meant to prevent a malware program called Benny Gantz-55 named after Benny Gantz, Israel's Chief of General Staff from infecting the police's computer network  Trend Micro has obtained samples of malware implicated in a recent incident, The attack began with a spammed message purporting to come from the head of the Israel Defense Forces, Benny Gatz. The From field has the email address, bennygantz59(at)gmail.com and bore the subject IDF strikes militants in Gaza Strip...
HootSuite technical issue exposed emails of thousands of users

HootSuite technical issue exposed emails of thousands of users

Nov 12, 2012
Social Media Management tool HootSuite today face technical issue and expose email address's of thousands of users. Due of error lots of people receive email reminders with warning that their free 60-day HootSuite Pro trial was about to end, but also included the names and email addresses of other people using the service. Image Source : TNW According to Hootsuite, the incident occurred to under 4000 emails and many of the users who are getting the email spam were not even signed up for HootSuite’s Pro trial. In a blog post HootSuite said, " At this time, we are requesting that recipients destroy the messages in order to help us contain the issue. Privacy is a paramount concern for HootSuite and this is in no way a reflection of the respect we have for our users and their privacy ." " Given HootSuite’s recent acquisition of Seesmic, we could speculate that the mass of emails could be down to a failed import of user accounts. We have, of course, re...
John McAfee accused of murder, wanted by Belize police

John McAfee accused of murder, wanted by Belize police

Nov 12, 2012
John McAfee, who started the antivirus software giant named after him, has been accused of murder in Belize and wanted.  Gizmodo reports that McAfee has been living in Belize for a while now, spending most of his time there experimenting with drugs. McAfee's marketing slogan: " Safe is not a privilege. It is a right. " This news comes just a few days after Gizmodo ran a long story about McAfee's increasingly erratic and borderline criminal behavior. In it, he sounds paranoid as he talks about people wanting to take his money and kill him and he admits to having associated with gangsters in Belize. McAfee had taken to " posting on a drug-focused Russian message board...about his attempts to purify the psychoactive compounds colloquially known as 'bath salts, '" Gizmodo wrote. The scariest aspect of this story may be the fact that an entire lab was constructed for John McAfee’s research purposes. Because of his efforts to extract chemicals...
cyber security

From Prompts to Production: The Technical Guide to Secure Vibe Coding

websiteWizAI Security / Vibe Coding
Strengthen security across your AI development workflows and secure AI-generated applications with Vibe Coding best practices.
cyber security

Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders

websiteZscalerAI Security / Network Security
VPN Risk Report reveals attackers using AI to move at machine speed, leaving legacy VPNs exposed.
ClubHack 2012 Hacking and Security Conference

ClubHack 2012 Hacking and Security Conference

Nov 12, 2012
Carrying reputation of being India's choicest and oldest hacker’s conference, Team ClubHack proudly brings the 6th edition of ClubHack Hacking and Security Conference with more exciting activities. ClubHack 2012 hacker’s convention will be held from Nov. 30th to Dec 3rd, 2012 in Pune, India. ClubHack in true sense is a community event and is always the most cost effective yet biggest security event of India. ClubHack 2012 is highly technical conference with 2 days of Technical Briefings and 2 days of hand-on training workshops. ClubHack2012 is loaded with more number of talks, more workshops and a special event HackNight. Event includes specialized hands-on training workshops for Network Admins, DBAs, Developers, Researchers, Architects, Managers, Govt. Agencies, Auditors and Students. For the first time ClubHack introduces a new event for hackers & developers – HackNight, a night where actual hackers spend time not to “break” into someone but to “make” something i...
Cyber Criminals can make your Diwali unforgettable with Scams

Cyber Criminals can make your Diwali unforgettable with Scams

Nov 11, 2012
Cyber criminals become hyper active during festivals. Diwali is no exception. Shantanu Ghosh, Vice-President and Managing Director (India Product Operations) of Internet security solutions company Symantec has observed that malware authors and spammers are using Diwali (The festival of lights that’s celebrated across the world (primarily in the Indian sub-continent) as the latest event to lure unsuspecting users into downloading malware, buying products, and falling for scams. Shantanu said cyber criminals attempt to ‘poison’ web search engine results to take advantage of huge rush in search activity during popular events. “ We have observed that cyber attackers are using various techniques to make the most of Diwali, ” he warned. Cyber-attackers make use of social engineering tactics to lure users to purchase from or register on unknown websites. Users may be exposing personal information to Internet scammers. “ Before giving into the temptation of clicking on a link in ...
Anonymous Hackers may have hacked Former CIA Director

Anonymous Hackers may have hacked Former CIA Director

Nov 11, 2012
CIA Director was uncovered when a woman described as close to him received harassing emails and complained to authorities. The FBI traced the emails and found that they had been sent by Paula Broadwell, who wrote a highly favorable book on the former Army general's life and work. While initially investigating the reports, the FBI feared the CIA director's personal email account may have been hacked, but the sexual nature of the email exchanges exposed the affair. A Yahoo email account belonging to former CIA Director David Petraeus may have been compromised by the group Anonymous. The personal email account was exposed during the the leak of commercial intelligence company STRATFOR by Anonymous Hackers, among other millions of email accounts of customers belongs to the company.  The emails sent by Broadwell indicated that she perceived the other woman as a threat to her relationship with Petraeus, law enforcement officials. Anonymous also obtained email l...
Latest Java vulnerability exploitation leads to ransomware

Latest Java vulnerability exploitation leads to ransomware

Nov 10, 2012
Imagine someone getting access to your computer, encrypting all your family photos and other priceless files, and then demanding a ransom for their safe return. That is what ransomware is all about. Symantec’s latest research report suggests police-themed ransomware could be a replacement to the once-lucrative fake antivirus scareware trade. According to  report , Ransomware distributors are raking in around $5 million dollars a year and the spoils are being spread among just 16 crime groups. Symantec’s estimates suggest a significant but not yet thriving crime business, which delivers each operation, on average, $300,000 a year. Reticently identified Oracle Java SE Remote Java Run time Environment vulnerability (  CVE-2012-5076 ) leads to  Geo located   Ransomware Malware . Java vulnerability actually can allows attacker to unauthorized disclosure of information, unauthorized modification and disruption of service. This R...
Guadeloupe National Domain registrar hacked, Twitter & Google domain credentials leaked

Guadeloupe National Domain registrar hacked, Twitter & Google domain credentials leaked

Nov 10, 2012
Guadeloupe is a Caribbean island located in the Leeward Islands, in the Lesser Antilles. Today a hacker going by name "UR0B0R0X" claimed to hack into the " Network Information Center Guadeloupe " (nic.gp), which is Guadeloupe National Domain registrar having control over domains of big companies like Google.gp, Paypal.gp, twitter.gp, Yahoo.gp,  and many more. Hacker claimed to hack server of  nic.gp and leak credentials (encrypted) of 1271 Guadeloupe domains and user accounts including usernames, email addresses and phone numbers from server as shown via a  paste-bin note . and complete database uploaded on a  file sharing  site.
Hackers release Windows Phone 8 Malware - to be showcased at MalCon

Hackers release Windows Phone 8 Malware - to be showcased at MalCon

Nov 10, 2012
It's be Just hours Windows Phone 8 has been released - and hackers have already dished out a malware prototype for the platform. Windows Phone 8 is the second generation of the Windows Phone mobile operating system. Windows Phone 8 Microsoft’s latest in mobile OS technology - comes in as a direct competition to rivals Apple and Google. The research firm Gartner indicates that by 2016 the increase in Windows Phone users will slightly fall below Apple`s iOS users. To be showcased at the International Malware Conference, MalCon - on 24th November in India, the prototype has been created by Shantanu Gawde, who has previously created a malware that utilized the famed Xbox Kinect. Windows Phone 8 replaces its previously Windows CE-based architecture with one based on the Windows NT kernel with many components shared with Windows 8, allowing applications to be easily ported between the two platforms. While no further details of the malware are available at this point of time, it will ...
Hacker ‘Cosmo the God’ Sentenced and Banned from Internet for Six Years

Hacker ‘Cosmo the God’ Sentenced and Banned from Internet for Six Years

Nov 10, 2012
A 15-year-old  UG Nazi hacker  going by the name of Cosmo or Cosmo the God  was sentenced in juvenile court on Wednesday with terms for six years without any computers or Internet, until his 21st birthday. During these 6 years, he'll need approval from his parole officer to access the internet. Wired report that hacker resides in Long Beach, California, and began as a politicized group that opposed SOPA, took down a bevy of websites this year, including those for NASDAQ, CIA.gov, and UFC.com. It redirected 4Chan’s DNS to point to its own Twitter feed. Hacker pled guilty to more than a few felonies, with charges ranging from credit card fraud to online impersonation. The probation that Cosmo agreed to as part of his plea limits his use of the internet to solely educational purposes, and all use will be supervised. As part of the hacker group UGNazi, he was able to gain access to accounts on sites including Amazon, PayPal, Microsoft, Netflix, and many more...
Kuwaiti Ministry of Awqaf and Islamic Affairs Defaced by Anonymous Hacker

Kuwaiti Ministry of Awqaf and Islamic Affairs Defaced by Anonymous Hacker

Nov 09, 2012
Anonymous hacker deface Kuwaiti Ministry of Awqaf and Islamic Affairs ( http://islam.gov.kw/)  Deface page have Anonymous Mask as shown in screenshot with an Arabic language message . Translated message " Letter to the Kuwaiti people full and without any exception ! Jordan and Palestine red line and pocket Asarthm Bandas ! God bless you, O Saddam and what God has failed them !! Gary trampling upon you and one-and-one, O and Ladd dog !! Strong Protection, is Our Target " At the time of writing, site is defaced, This Anonymous groups seems to to be note related to whole anonymous groups and Operations. Will will update you soon with more updates.
English Defence League defaced by ZCompany Hacking Crew

English Defence League defaced by ZCompany Hacking Crew

Nov 09, 2012
ZCompany Hacking Crew members hack and deface  English Defence League official website (http://englishdefenceleague.org),a far-right British organization . Deface page include text " Fuck Zionist Jews! – Boycot israel! – Fuck the American Government! - Fuck fascist Organizations like EDL" and a screenshot of a email. " EDL admins have been harassing innocent people and stealing money from them to fund their racist adventures " Hacker continue. Hacker trend the hacking operation as # OPEDL and #OpRacism  on twitter. Further message include, " Such a shame! EDL admins! as we ZHC said we will always be one step ahead of you. We will chase you, expose your racism and even remove you from the web. We demonstrated it successfully by deleting your facebook page three times. And we have demonstrated it successfully by defacing and exposing your frauds yet again.But the best is yet to come. Yes right, details of supporters and donors of EDL will be made p...
Window 8 will get its first critical patch this Friday

Window 8 will get its first critical patch this Friday

Nov 09, 2012
The Windows 8 and Windows RT security updates will be the first shipped since those operating systems' launch on Oct. 26. The latest vulnerabilities include three critical security vulnerabilities for Windows 8, and one critical security vulnerability for the Surface-based Windows RT operating system. These flaws are considered "critical" and could allow remote code execution on vulnerable systems. Among the various flaws, versions from Windows XP (Service Pack 3) all the way through to Windows 8 are affected, including versions of the Office suite, and versions of Windows Server. Released only in September, Windows Server 2012 requires patching to maintain maximum security. If you've enabled automatic updates, the patches will automatically install on Tuesday. As usual, the specific details about what is being fixed in these updates won't be revealed until the patches themselves are available for download in order to not give hacker groups an advance...
New Dead drop techniques used by Security Agencies

New Dead drop techniques used by Security Agencies

Nov 09, 2012
Paul F Renda give an overview that, What and how new long distance and short distance Dead drop techniques are used by National Security Agency for secure communications. What is a dead drop? It is methods that spies use or have used to communicate with associates who have information for them. The dead drop allows them to exchange information without having actual physical contact with each other. The person leaving the information can leave it under a rock or a can or bush. A special type of empty spikes that can be dropped into holes has also been used drop information. The person leaving the information also leaves some kind of signal the drop was made. The signal could be a chalk marks on a tree or pavement. Someone views the signal and retrieves information. Some more unusual dead drops have used dead animals like rabbits, rats and large birds to hide the information. These have been used by both the CIA and KGB. The one problem with this type of...
Bangladesh military Server and internal network Compromised

Bangladesh military Server and internal network Compromised

Nov 09, 2012
Indian Hacker  Godzilla aka G.O.D hacked into Bangladesh Army servers, belongs to domain  www.army.mil.bd and leak Internal Network Information via a note . Hacker also publicly posted their Cisco Router passwords and Mac-Address of all machines within the network. We talked with the hacker to know reason of hacking , and he reply, " Its Parade time for you, Bangladesh Army ! ! ! Even a municipal school website has better security than your website. You have time till December, secure it if u can.. Stop supporting terrorist organizations.. Put your best men at work now, we will come back in December. see you soon.. ./Peace is just what we want.. ./live and let others live. ." In his statement hacker threat to hack Bangladesh sites again by December, if they will not stop supporting terrorism. At the time of reporting this news, the official website of Bangladesh military is down because of cyber attack by Go...
Hong Kong stock exchange Hacker sentenced for 9 Months Jail

Hong Kong stock exchange Hacker sentenced for 9 Months Jail

Nov 09, 2012
Tse Man- lai,  28-year-old businessman, owner of an information technology company, launched denial-of-service (DoS) attacks on Hong Kong stock exchange last year on August 12 and 13 , was sentenced to nine months in jail on Friday. According to SCMP , Tse Man- lai, who had pleaded not guilty to two counts of obtaining access to a computer with criminal or dishonest intent, was convicted of both counts in the District Court on October 24.  The attacked website is one of the most important economic platform of Hong Kong. Trading in the shares of seven companies was suspended. The seven companies, which included HSBC, Cathay Pacific Airways and HKEx itself, had a combined market value of HK$1.5 trillion. Trading was also halted on a debt security and 419 warrants and derivatives linked to the suspended stocks. Trading in the stocks were suspended, as the companies had tried to make price-sensitive announcements during the lunchtime trading break, which investor...
Stuxnet virus also infected Chevron's IT network

Stuxnet virus also infected Chevron's IT network

Nov 09, 2012
Stuxnet , a sophisticated computer virus created by the United States and Israel, to spy on and attack Iran’s nuclear enrichment facilities in Natanz also infected Chevron ’s network in 2010, immediately after it spread into the wild. This Government created virus Now Infecting Corporations also. Chevron oil giant found the virus in its systems after the malware' s existence was first reported in a blog post in July 2010, according to Mark Koelmel, general manager of the earth-sciences department at the big U.S. oil company. The U.S. government has never officially acknowledged the Stuxnet program. Stuxnet  which was designed to attack computer systems designed by German industrial giant Siemens for managing water supplies, oil rigs, power plants and other critical infrastructure has turned up in other countries. According to the Wall Street Journal, Chevron's experience with Stuxnet appears to be the result of the malware's unintentional release into...
Art of twitter account hacking, now or never !

Art of twitter account hacking, now or never !

Nov 09, 2012
Phishing is most commonly perpetrated through the mass distribution of e-mail messages directing users to a fraud web site or services. These professional criminals daily find new ways to commit old crimes, treating cyber crime like a business and forming global criminal communities. Another latest scam has been notified by GFI that, where cyber criminals are offering the art of hacking Twitter accounts with a web-based exploit. Phishers are sending scam emails and offering fake twitter account hacking service, which in actual will hack their own twitter accounts. Email from phishers have text, “ Do you want to learn how to hack twitter? Are you looking for a way to hack your friends twitter account without them finding out? Interested in finding out ways to hack someone’s profile? Maybe you want to take a quick peek at their direct message inbox, steal their username or find a glitch to use a hacking script, ”. Hackers try to convince readers by showing a exploi...
United Socialist Party of Venezuela's twitter account hacked

United Socialist Party of Venezuela's twitter account hacked

Nov 09, 2012
LulzSec Peru hack the official twitter account ( @partidopsuv ) of the United Socialist Party of Venezuela (PSUV), in the evening hours of Thursday. Hackers start twitting from hacked account, “ No to communism. Corrupt Chavez get out. ” In a blog post Party people announce that their twitter account is compromised and " Unfortunately this type of attacks, which are part of the fourth generation war that we face today, promoted by the fascist right. " Now account credentials are recovered by party but the tweets posted by hackers are still online. The pastebin link posted by hackers contain more Emails and Documents dumps .
Detected a malware that steal image files via FTP … Should we be concerned?

Detected a malware that steal image files via FTP … Should we be concerned?

Nov 09, 2012
I have recently found an interesting post of Niranjan Jayanand, a researcher of McAfee and members of Facebook team and customer escalation team. The experts announced that his team has recently detected a Trojan that is able to steal every king of image files form a Windows PC, including a memory dump of the victim machine (.dmp files), and upload them to an FTP server. The activities observed are much suspected, they portend that there is an ongoing attack for cyber espionage or a massive information theft operation by  cyber crime  . This could be just a first stages of the attacks in which information are collected for further and complex initiatives. The stolen image files could be used for blackmailing the victims and demanding a ransom , it’s nor first time, let’s reminds what happened some months ago when nude pictures of celebrities were stolen. This is not the unique use that I could suppose, images could be also used for other purposes, they could be ...
Adobe Reader zero-day vulnerability with modified Blackhole Exploit-Kit

Adobe Reader zero-day vulnerability with modified Blackhole Exploit-Kit

Nov 08, 2012
Group-IB , a Russian cybercrime investigation company has discovered a zero-day vulnerability, affects Adobe Reader X and Adobe Reader XI. The vulnerability is also included in new modified version of Blackhole Exploit-Kit , which is used for the distributing the banking Trojans (Zeus, Spyeye, Carberp, Citadel) with the help of exploitation different vulnerabilities in client-side software. The particular exploit is available in underground forums for as much as $50,000 and bug is dangerous because it permits cybercriminals to run arbitrary shellcode by bypassing the sandbox feature integrated into the more recent versions of Adobe Reader. For now this flaw is distributed only in only small circles of the underground but it has the potential for much larger post-exploitation methods. The exploit is limited to  Microsoft Windows installations of Adobe Reader and it can’t be fully executed until the user closes his Web browser (...
Kim Dotcom's New Domain Me.ga Seized before its launch

Kim Dotcom's New Domain Me.ga Seized before its launch

Nov 07, 2012
Kim Dotcom is still fighting a legal battle in New Zealand against the United States over alleged copyright infringement and piracy. Kim Dotcom's upcoming Mega website Me.ga has had its domain name seized by the African nation of Gabon, with a government minister saying his country will not be used as a base for copyright infringement. Last week, Dotcom unveiled plans to relaunch his file-sharing site in January 2013, using the Gabonese domain me.ga, with the message " this button will change the world ." "Gabon cannot serve as a platform or screen for committing acts aimed at violating copyrights, nor be used by unscrupulous people," says the country's Communication Minister Blaise Louembe. Dotcom reassured his followers, by tweeting , " Don't worry. We have an alternative domain. This just demonstrates the bad faith witch hunt the US government is on...Gabon Minister used time machine to analyze legality of the future Mega. Verdict: Cyber cri...
Anonymous hacker arrested for attacking Home Secretary website

Anonymous hacker arrested for attacking Home Secretary website

Nov 07, 2012
In the UK a 41-year-old man has been arrested over a cyber attack on the website of the British Home Secretary Theresa May. He was arrested in a joint operation by Scotland Yard and local officers on Tuesday morning in Wedgewood Road. The man, who has not been named, was arrested on suspicion of assisting or encouraging crime contrary to the Serious Crime Act 2007. He was taken to a local police station and bailed to return in mid-December, pending further inquiries. Computers, telephones and media storage devices were seized from his home, according to police. Detective Inspector Jason Tunn, from the Metropolitan Police’s eCrime Unit (PCeU), said, “ The activity this morning demonstrates the commitment of the PCeU and our colleagues to combat cyber criminality anywhere within the UK and take action against those responsible. Assisting and encouraging cyber crime is a serious matter and I would advise all persons to consider their actions and any possible future ...
Pizza Hut defaced, Authorities denies theft of 240000 Credit Cards

Pizza Hut defaced, Authorities denies theft of 240000 Credit Cards

Nov 07, 2012
Yesterday Australian Pizza Hut website was compromised by a hacking group going by the name of 0-Day and Pyknic . Hackers defaced the website and claim that they made off with 260,000 Australian credit card numbers. Hack was 1st noticed by  Whirlpool Forum users. But a Pizza Hut spokeswoman said the company did not store such information on its website. " Pizza Hut can confirm that a layer of its website, pizzahut.com.au , was breached with access gained to names and contact information, including email addresses ". " We are working with our website providers to conduct a thorough investigation of the matter and have also reported the incident to the Office of the Australian Information Commissioner. We would like to reassure all of our customers that absolutely no credit card information was stolen and there is no need for concern regarding credit cards." "The security of our online ordering system has not been compromised in any way and our customers ca...
Skype Illegally handed over data of alleged Anonymous Paypal Hacker

Skype Illegally handed over data of alleged Anonymous Paypal Hacker

Nov 06, 2012
Dutch media report   Skype has Illegally (without court order) distributed a 16 years old user's personal information including user name, real name, email addresses and the home address used for payment to a private company consistently a police investigation into Anonymous-sanctioned cyber attacks on PayPal.  In 2011 most of the online payment solution companies blocked donations to WikiLeaks, in relation to this Anonymous Hacker DDOS paypal and Mastercard. During investigation of attack an IT firm reach skype for the information of their use and Skype  handed over the personal information of a 16-year-old  Illegally to them. Dutch media report that Police operating the case as 'Operation Talang' which is actually focussed on two persons. Joep Gommers, senior director of global research at the Dutch IT security firm iSIGHT Partners, was hired by PayPal to investigate the attacks. They are Alleged to...
UNESCO Etxea website hacked by #NullCrew

UNESCO Etxea website hacked by #NullCrew

Nov 06, 2012
Hacking group #NullCrew deface UNESCO Etxea website (unescoetxea.org), which is an internationally oriented NGOs working for the culture of peace, sustainable human development and human rights, at local and global levels. Deface page reads, " Welcome to the new front page of unesco etxea You have been targeted by NullCrew, as part of the FuckTheSystem movement. We have began the war, once again; but this time, good-luck even coming close to winning. " " The united nations, just a bunch of corrupt nations; united by one source of power.. And for that reason, we have came back; to repeat the process. Enjoy the candy. " After watching the data dumped on deface page including the kernel version of server and wordpress database configuration file we can judge that, hacker is able to upload the php shell on website of UNESCO Etxea and he deface the web page. #NullCrew today also hack  UK Ministry of Defence and dump database...
Chrome 23 Released, 14 vulnerabilities patched

Chrome 23 Released, 14 vulnerabilities patched

Nov 06, 2012
Google today released Chrome version 23 to the Stable Channel. 23.0.1271.64 for Windows, Mac, Linux, and Chrome Frame. Update includes patch for 12 vulnerabilities in the Windows version and two vulnerabilities in Mac OS X version. Chrome 23 is the support of the Do Not Track (DNT) protocol, number of new features including GPU accelerated video decoding on Windows and easier website permissions. " We recently enabled GPU-accelerated video decoding for Chrome on Windows. Dedicated graphics chips draw far less power than a computer's CPU, so using GPU-accelerated video decoding while watching videos can increase battery life significantly ." Out of  14 vulnerabilities , 6 vulnerabilities rated as high and rest are of either medium or low severity. CVE number of all bugs are - CVE-2012-5128, CVE-2012-5126, CVE-2012-5125, CVE-2012-5124, CVE-2012-5123, CVE-2012-5115, CVE-2012-5127, CVE-2012-5120, CVE-2012-5116, CVE-2012-5118, CVE-2012-5121, CVE-2012-5117,CVE-2012-5119, ...
UK Ministry of Defence hacked by NullCrew

UK Ministry of Defence hacked by NullCrew

Nov 06, 2012
The United Kingdom Ministry of Defence website (www.qhm.mod.uk) hacked by two Null Hacking Crew members  @OfficialNull  and @Timoxeline  and They extracted data published online . The data dump include 3400 email addresses and passwords from Ministry of Defence portal. Hackers trying to trend  #FuckTheSystem hashtag on twitter and related it to all their hacks against UK government. Hacker wrote on note : " Your webmaster made a terrible mistake... You may criticize us on the simplicity of the vulnerability. But if you can get so much useful data so easily, why wouldn't you? " "We hope that all governments and organizations realize that #FuckTheSystem is definitely not a joke. We hope that you have the decency to grasp the concept of it. But hey... You're the government right... Just some butthurt little fags. This security just proves how much of a joke our governments are. " note continue. Hackers mention that, they hack the website ...
Patch released for 7 critical Adobe Flash Player Vulnerabilities

Patch released for 7 critical Adobe Flash Player Vulnerabilities

Nov 06, 2012
Adobe release updates for Flash Player on Windows, Mac, and Linux to address 7 recently identified critical security vulnerabilities. Updated version is now 11.5.502.110 for Windows or Mac OS X users or to 11.2.202.251 for Linux. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. A recent Q3 2012 Threat repor t from Kaspersky Lab showed that nearly 30% of the exploits circulating online are targeting Adobe products. Java vulnerabilities were exploited in more than 50% of all attacks. According to Oracle, different versions of this virtual machine are installed on more than 1.1 billion computers. CVE number of 7 critical Adobe Flash Player Vulnerabilities are CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, CVE-2012-5278, CVE-2012-5279, CVE-2012-5280. Adobe’s advisory about this update is available here .
Russian Underground Cybercrime market offering sophisticated services

Russian Underground Cybercrime market offering sophisticated services

Nov 05, 2012
Security firm Trend Micro recent analyses the Russian crimeware markets and has found that malware tools and services range from one-time packages which cost just pennies to sophisticated packages and services which cost purchasers thousands of dollars per month. If you want to buy a botnet it will cost you somewhere in the region of $700. If you just want to hire someone else’s botnet for an hour, though, it can cost as little as $2. There are at least 20 different types of services offered in Russian-speaking forums for just about anyone who wants to make a buck off of cybercrime, everything from crime-friendly VPN and security software-checking services to plain old off-the-shelf exploits. " As the Russian underground community continuously modifies targets and improves technologies, security companies and users must constantly face the challenge of effectively protecting their money and the information they store in their computers and other devices ," the ...
Illiterate Ethiopian kids hack Motorola Xoom

Illiterate Ethiopian kids hack Motorola Xoom

Nov 05, 2012
About five months ago, OLPC Project started a little experiment . They chose a village in Ethiopia where the literacy rate was nearly 0% and decided to drop off a bunch of Motorola Xooms there. The One Laptop Per Child project started as a way of delivering technology and resources to schools in countries with little or no education infrastructure, using inexpensive computers to improve traditional curricula. On the tablets, there was custom software that was meant to teach kids how to read. This experiment began earlier this year. Timeline of Experiment: 1st Four Minutes - One kid had opened the box and had figured out how to turn on the Xoom. In 1st Five Days -  The kids were using nearly 50 applications each every day. In Two Weeks - The kids were singing their ABC’s in English. Now its 5th Month - They hacked the Motorola Xooms so they could enable the camera, which had been disabled by OLPC. OLPC founder Nicholas Negroponte at MIT Technology Review's EmTech confer...
Expert Insights Articles Videos
Cybersecurity Resources