#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Chinese website Jpsp.cc database owned by Team Jmc H4x0rs !

Chinese website Jpsp.cc database owned by Team Jmc H4x0rs !

Jan 07, 2011
Chinese website Jpsp.cc database owned by Team Jmc H4x0rs ! Admin Panel :  Database : Members :  Website Link :  https://www.jpsp.cc/ News Source : Team Jmc H4x0rs
Facebook Instant Search : Browse the Facebook Instantly like never before !!

Facebook Instant Search : Browse the Facebook Instantly like never before !!

Jan 07, 2011
Facebook Instant Search : Browse the Facebook Instantly like never before !! Browse the Facebook Instantly like never before !!. Search in your friends\' posts, status, comments and much more... Visit to try it out: (No registration required, Just type and search) Link :  https://www.fbinstant.net/ News Source : Rohit Thakur
Undetectable fake ATM keyboard steals PINs in real time !

Undetectable fake ATM keyboard steals PINs in real time !

Jan 07, 2011
Thieves and scammers are an inventive bunch, especially when it comes to stealing you money indirectly.   And the latest discovery of a fake keyboard that is placed over an ATM's legitimate one and records the typed-in PIN - in conjunction with a fake magnetic strip reader that can be manufactured from cheap spare electronic parts - shows that this kind of crime does not require a lot of funds and can bring in quite a lot of money. According to Gizmodo, the keyboard is virtually undetectable by anyone who is not an expert, and looks exactly like the real thing. It records the PIN as you type it in and sends this information and that regarding the credit card magnetic strip to the criminals in real time, so they can immediately proceed to emptying your account. US ATM users are particularly susceptible to these type of theft, since many ATMs work on the same principle. The chip-and-PIN technology used in Europe is harder to crack, so a number of US banks have started ado...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Fuzzing tool discovers over 100 vulnerabilities in popular browsers !

Fuzzing tool discovers over 100 vulnerabilities in popular browsers !

Jan 07, 2011
The public release of   cross_fuzz   - a cross-document DOM binding fuzzer that is able to detect vulnerabilities in all browsers by examining how they interact with various elements while they render web pages - by the Google-employed security researcher Michal Zalewski has   unveiled   some worrying information. First, that some of the over 100 vulnerabilities found in browsers such as Internet Explorer, Firefox, Opera, and WebKit powered Chrome and Safari are still currently unpatched. Second, that at least one of the IE vulnerabilities discovered may be known to third parties apparently located in China. Stating that this was the main reason for making the fuzzing tool and that information public, he explained how he came to that conclusion. "While working on addressing cross_fuzz crashes in WebKit prior to this announcement, one of the developers accidentally leaked the address of the fuzzer in one of the uploaded crash traces. As a result, the fuzzer dire...
Estonia institutes volunteer cyber army !

Estonia institutes volunteer cyber army !

Jan 07, 2011
In 2007, when Estonia's government, financial and media computer networks were attacked by unknown Russian hackers following the government's decision of relocating a Soviet war memorial, it must have been hard to believe that something good would come from it at the end.   With that attack, Estonia became the first country ever to actually be engaged in a cyberwar, but that didn't make them despair. If anything, that incident was what spurred them to institute their own Cyber Defense League - an organization that gathers computer scientists, programmers, software engineers and cybersecurity specialists and would, in time of war, be under the direct command of the military. So far, all the members are part of the organization because they volunteered, and they spend part of their weekends carrying out simulated exercises of cyber attacks in order to keep their skills honed and ready. But, Estonia's Defense Minister Jaak Aaviksoo and the authorities are thinking about...
One-third of malware was created in 2010 !

One-third of malware was created in 2010 !

Jan 07, 2011
One-third of existing malware was created in 2010, a report has revealed. Anti-malware laboratory PandaLabs discovered the findings in its 2010 Annual Security Report which detailed a year of huge cyber-crime activity. It revealed that around 34 per cent of the 60 million existing viruses that have ever been created or distributed were produced by cyber-criminals last year. Additionally, around 40 per cent of the relatively new threat of fake antivirus software, more commonly known as rogueware, was created last year. Last year also saw an explosion in cyber-war and cyber-activism including examples such as the Stuxnet virus as well as the WikiLeaks scandal and the 'hacktivism' that followed. However, PandaLabs revealed some positive data security news, the speed at which new threats are growing fell in 2010 to 50 per cent, compared to the 100 per cent growth seen every year since 2003. An expert at SearchSecurity.com revealed that the most prevelant and dangerous da...
Beware : Google illegally collected private info !

Beware : Google illegally collected private info !

Jan 07, 2011
Police confirmed Thursday that Google, the world's largest online search engine operator, illegally collected and stored personal data sent over unsecured Wi-Fi wireless networks here while creating the localized version of its online mapping service. Korea and 15 other countries, including the U.S., Canada, Germany, France, Britain, and Australia, have been investigating whether Google broke their privacy laws in the process of making its "Street View" service.   Korea has become the first to announce publicly that the California-based company gathered communication records, such as e-mail and instant messages, passwords and search histories.   The Cyber Terror Response Center, affiliated with the National Police Agency, said it broke codes of computer hard drives confiscated from Google's Seoul office last August and found hundreds of thousands of e-mails, instant messages and other personal data.   "We unlocked 79 computer hard disks seized from Google Korea l...
Pwnshell : A Better JSP Shell download !

Pwnshell : A Better JSP Shell download !

Jan 07, 2011
pwnshell is a stripped down version of the c99 shell and the likes. The only difference is that it a single JSP file, embedded with jQuery with a xterm like interface. This is most useful at times when we when have an arbitrary file upload to a web-accessible directory that runs on J2EE. It could allow you to browse around the system with the privileges of the web application system user and execute arbitrary system commands. It can also show and alter session variables and help you dump JNDI entries. pwnshell is a cross platform shell that runs on any system that supports Java 1.5 upwards. It's usage is also simple – upload it to a vulnerable web directory, point your browser to the shell and when you get the shell, just pretend that you're looking at the xterm interface. The best of all, it is open source! Download the pwnshell here.
JNTUH College site Hacked by Indonesian BlackHat Team !

JNTUH College site Hacked by Indonesian BlackHat Team !

Jan 07, 2011
JNTUH College site Hacked by Indonesian BlackHat Team ! Hacked Link :   https://jntuhcej.ac.in/bulletin_board/nd.htm
Miley Cyrus email Hacker arrested by FBI !

Miley Cyrus email Hacker arrested by FBI !

Jan 06, 2011
The guy who allegedly broke into  Miley Cyrus ' email account two years ago and flooded the Internet with scandalous pics of the underaged pop star was just arrested -- but NOT for hacking Hannah Montana. According to federal court docs,  Josh Holly  was busted in Nashville last Thursday after FBI agents seized and searched his computer ... allegedly finding several unauthorized credit card account numbers. Law enforcement sources claim Holly -- who reportedly bragged online about pilfering semi-nude pics of Miley from her email account -- admitted to hacking into Cyrus' MySpace ... but hasn't yet faced charges stemming from the incident. Holly was released Monday. Miley's rep had no comment.
Website of the Baseball Writers' Association of America hacked !

Website of the Baseball Writers' Association of America hacked !

Jan 06, 2011
The website of the Baseball Writers' Association of America was hacked Wednesday morning, mere hours before results of the Hall of Fame voting was announced. For about two hours, visitors to BBWAA.com were greeted by a message from the "Gaza Hacker Team." Hall of Fame voting results remained secure, as that info was still restricted to the National Baseball Hall of Fame and Jack O'Connell, the Secretary-Treasurer of the BBWAA who tabulates the voting. BBWAA members were unsure whether the site was specifically targeted or the timing of the hack job was coincidental.
Expert Insights Articles Videos
Cybersecurity Resources
//]]>