#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Facebook virus spreads via photo album chat messages !

Facebook virus spreads via photo album chat messages !

Jan 10, 2011
A new social networking worm in the vein of Koobface is currently doing the rounds. A Naked Security reader, George, who had been exposed to it on Facebook reported it to us - unlike the majority of Facebook scams we report, this one actively infects your computer with malware instead of simply tricking you into taking surveys and passing on messages to other users. The link in his Facebook chat from a friend pointed to an app.facebook.com/CENSORED link. Typically when you go to a Facebook app page it prompts you to add the application and grant it permission to post on your behalf or read your profile data. The scary part about this one is that it immediately prompts you to download a " FacebookPhotos#####.exe " file with no prompting or clicking required. The screen reads "Photo has been moved. This photo has been moved to other location. To view this photo click View Photo." If your computer has not already downloaded the malware, the "View Photo"...
Rumors of Facebook shutting down !

Rumors of Facebook shutting down !

Jan 10, 2011
Rumors of an impending Facebook shutdown had the site's millions of users in a panic Saturday as they wondered who would take their number one procrastination tool away. The Internet rumor was sparked by a report from the "Weekly World News," a website which also includes a story insisting "Alien spaceships to attack Earth in 2011" and another titled "Mike Tyson Pigeon Fetish." According to their Facebook "story," the super popular social media website would be shut down in March because Mark Zuckerberg was getting too stressed out. "Facebook has gotten out of control and the stress of managing this company has ruined my life," the newspaper quoted Zuckerberg as saying at an alleged press conference in California on Saturday. The questionable story apparently sent Facebook users into a panic. The phrase "is facebook shutting down" was the 14th most searched for on Google Saturday and the 10th most as of Sunday morn...
U.S. investigators demand details about WikiLeaks' Twitter account from court !

U.S. investigators demand details about WikiLeaks' Twitter account from court !

Jan 09, 2011
U.S. investigators have gone to court to demand details about WikiLeaks' Twitter account, according to documents obtained Saturday -- the first revelation about the criminal case Washington is trying to build against those who leaked classified U.S. documents. The U.S. District Court for the Eastern District of Virginia issued a subpoena ordering Twitter Inc. to hand over private messages, billing information, telephone numbers, connection records and other information about accounts run by Assange and others. The subpoena also targeted Pfc. Bradley Manning, the U.S. Army intelligence analyst suspected of supplying the site with classified information; Birgitta Jonsdottir, an Icelandic parliamentarian and one-time WikiLeaks collaborator; and Dutch hacker Rop Gonggrijp and U.S. programmer Jacob Appelbaum, both of whom have worked with WikiLeaks in the past. The subpoena, dated Dec. 14, asked for information dating back to November 1, 2009. Assange blasted the U.S. move, saying...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
PandaLabs Releases : Annual Report 2010 (Must Read) !

PandaLabs Releases : Annual Report 2010 (Must Read) !

Jan 09, 2011
In 2010, cyber-criminals have created and distributed a third of all existing viruses. That is, in just 12 months, they have created 34 percent of all malware that has ever existed and has been classified by the company. Furthermore, the Collective Intelligence system, which automatically detects, analyzes and classifies 99.4 percent of all malware received, currently stores 134 million unique files, out of which 60 million are malware (viruses, worms, Trojans and other computer threats). Topics covered: Threats in 2010 Stuxnet, Iran and nuclear plants Cyber war Aurora Cyber-crime Cyber-protests Mariposa Social networks Rogueware 2010 in figures More BlackHat SEO Windows 7 vs Mac OS X Snow Leopard Cell phone security Spam in 2010 Vulnerabilities in 2010 Trends in 2011 Conclusion Trojans still dominate the ranking of new malware that has appeared in 2010 (56 percent of all samples), followed by viruses and worms. It is interesting to note that 11.6 percent of all the m...
Google Bangladesh website (Google.com.bd) Hacked by TiGER-M@TE

Google Bangladesh website (Google.com.bd) Hacked by TiGER-M@TE

Jan 09, 2011
Google Bangladesh website ( Google.com.bd ) Hacked by TiGER-M@TE We just got an anonymous tip that Google's been 'hacked' – sure enough, visitors of the company's Bangladesh search site (Google.com.bd) see a defaced landing page rather than the usual search site. As far as I can tell, www.google.com.bd functions properly, so whether this really constitutes a 'hack' is up for debate. According to Zone-h , Bangladeshi hacker TiGER-M@TE has been quite active with defacements lately, and has targeted some high-profile sites in the past, including the local website for American Express and Airtel (video). See google cache :   https://webcache.googleusercontent.com/search?q=cache:lOhkVDab32MJ:www.google.com.bd/+google+bangladesh&cd=1&hl=en&ct=clnk&gl=in News Source : TiGER-M@TE
Protests and Website Hackings in Tunisia !

Protests and Website Hackings in Tunisia !

Jan 09, 2011
We are concerned about demonstrations that have occurred over the past few weeks in Tunisia, which we understand to be the result of social and economic unrest. We encourage all parties to show restraint as citizens exercise their right of public assembly. We have also conveyed our views directly to the Tunisian government. Furthermore, we are concerned about recent reports that Tunisian ISP providers, at the direction of the government, hacked into the accounts of Tunisian users of American companies including Facebook, and providers of email such as Yahoo and Google, and stealing passwords. This kind of interference threatens the ability of civil society to realize the benefits of new technologies. Cyber intrusions of all kinds, including reported attacks on government of Tunisia websites, disrupt the free flow of information and reduce overall confidence in the reliability and security of vital information networks. We urge all parties to respect the freedoms of expression and inf...
Police warns - Beware Facebook scams !

Police warns - Beware Facebook scams !

Jan 09, 2011
Sophisticated scam artists are raiding blackberries, I-phones and personal computers and are using sites like Facebook to steal identities and money by fooling friends, Halifax police warn. Det. Const. Dana Drover said Wednesday the best way to protect yourself at home — or using public Wi-Fi — is to use a complex password and change it often. "There are individuals who make it their business to try and capture, or harvest, electronic data using devices that can capture wireless internet information," he said. That point was driven home over the Christmas holiday when Radio-Canada producer Paul Emile d'Entremont checked his Facebook and one of his Facebook friends started chatting with him. "She started off, 'How are you doing, Paul?' I said, 'Fine.' And she says, 'I'm not doing so well. I'm in London, England, and yesterday I was the victim of a brutal attack, and my face is swollen and they also stole all of my credit cards,'...
Woman arrested in stolen of credit card !

Woman arrested in stolen of credit card !

Jan 08, 2011
A woman has been arrested on more than two dozen counts of fraud and other charges after using a stolen credit card over the course of about two weeks. Susan J. Hancock, 53, was arrested on 25 counts of fraudulent use of a credit card, 25 counts of computer tampering, fraudulent schemes, theft of a credit card, forgery and criminal impersonation. The investigation by the Sierra Vista Police Department began after a report made on Nov. 27 by a resident in the 300 block of North Colombo Avenue. At some point in September or November of last year, Hancock is thought to have taken a credit card belonging to the victim from a shared mailbox at their residence, according to a probable cause statement submitted by police to the Sierra Vista Justice Court. The first purchase made with the card occurred on or about Nov. 4 and continued through Nov. 20 at local restaurants, convenience stores and various Internet web sites, according to the statement.  Investigators ...
North Korean government's official Twitter account hacked !

North Korean government's official Twitter account hacked !

Jan 08, 2011
The North Korean government's  official Twitter account  has apparently been hacked, with the feed displaying a string of messages derogatory of leader Kim Jong-il and heir apparent Kim Jong-un, the South Korean Yonhap news agency has reported. The four most recent messages posted on Saturday morning accuse the ruling family of exploiting the North Korean people to enjoy luxurious lives and develop nuclear arms and missiles. One message called for an uprising to kill the Kims "with a sword". North Korea opened the Korean-language Twitter account @uriminzok in August 2010, and since then has posted over 1,300 messages using the service. The name of the account can be translated to "our people", according to  The Korea Times . Earlier in the year, the government also launched YouTube and Facebook pages, in a bid to use the services to improve its image. The apparent hacking of the site on Saturday, also Kim Jong-un's birthday, is not the first such atta...
Experts said - Loopholes in law let cyber criminals get away !

Experts said - Loopholes in law let cyber criminals get away !

Jan 08, 2011
MUMBAI: Cyber experts say there should be proper guidelines when the court grants bail to those arrested under the Information Technology (IT) Act and fast-track courts for cyber-related cases will help proper convictions. Procedures currently followed to grant bail in cyber cases are similar to those under the Indian Penal Code. "Most of the accused are techsavvy and know the loopholes in the legal system very well," acyber expert said. Despite efforts by the cops, Rizwan Alsulkar managed to file a bail plea and will be out soon. "The time granted by the court to investigate the case was very less. This is not the first time where an accused caught under the IT Act has gone scot-free . In tech-related cases, the cops should get proper time to collect evidence ," a police official said. He added a person can be sentenced to 2-3 years under the IT Act. "However, conviction rate is very poor across the country, hardly going above 10% in the last 10 years....
Cyber harassment : Girl's morphed photo and phone number put on web !

Cyber harassment : Girl's morphed photo and phone number put on web !

Jan 08, 2011
BANGALORE: An Information Technology student who is in Bangalore in search of employment has filed a complaint against a youth for harassment. Thyagarajanagar police have registered a case against one Krishna Mohan who hails from Andhra Pradesh under the Information Technology Act 2000. The accused reportedly morphed the girl's photo with a nude picture and uploaded it on various porn websites with her mobile phone number. He also uploaded this information to social websites like orkut.com, police said. In her complaint, the girl has said she hailed from Guntur district in Andhra Pradesh and did her engineering in IT. Police said she met Krishna Mohan through a common friend Chitanya in October last year and he started proposing to her but she rejected him. He then started mailing her pornographic pictures and messages on her email ID. She came to Bangalore in search of job recently and stayed at her relative's house in Thyagarajanagar. She got some telephone calls from stra...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>