#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Sarah Palin's E-Mail Hacker Begins Prison Term !

Sarah Palin's E-Mail Hacker Begins Prison Term !

Jan 14, 2011
A former University of Tennessee student convicted of hacking the e-mail account of former Alaskan Governor Sarah Palin during the 2008 presidential campaign has begun his one-year sentence in an unfenced federal prison camp in Kentucky, authorities said Thursday. According to a statement issued by spokesman for the Federal Bureau of Prisons, 23-year-old David Kernell reported at the minimum security camp in Ashland, Kentucky on January 10 to begin serving out his sentence. Kernel's imprisonment at the Kentucky prison camp came despite a recommendation by sentencing Judge Thomas Phillips that he should serve out his term at a halfway house to reflect the "unique circumstances" of the case. In his ruling made in November, Federal Judge Thomas W. Phillips had recommended that David Kernell be allowed to serve out his time at the Midway Rehabilitative Center on Magnolia Avenue in Knoxville, a half way house located near the college where Kernell took classes this summer. In...
5 websites hacked by Pak Cyber Combat Squad !

5 websites hacked by Pak Cyber Combat Squad !

Jan 13, 2011
5 websites hacked by Pak Cyber Combat Squad ! Hacked List : https://www.4lifecostarica.net/Ibrarz.html https://www.abisdentalcare.com/Ibrarz.html https://www.churchcomplements.com/Ibrarz.html https://www.lafuentedelosmariscos.com/Ibrarz.html https://www.germanruiz.com/Ibrarz.html News Source : Pak Cyber Combat Squad 
Selena Gomez's Twitter and Facebook Accounts Hacked !

Selena Gomez's Twitter and Facebook Accounts Hacked !

Jan 13, 2011
Selena Gomez  has warned fans to ignore a series of hateful messages posted on her  Twitter  and  Facebook. com pages, after her online accounts were targeted by hoaxers. The Wizards of Waverly Place star's pages on the social networking sites were taken over by hackers earlier this week. Imposters confused fans with a series of profanity-riddled messages, including, "THE KID ON 4CHAN.ORG IS A LIEN F**KER HE DIDNT HACK S**T!!!!," and, "This message is for puha, YOU SUCK B**CH!!!" The unauthorized posts have since been deleted. And Gomez has taken to her Facebook page to warn fans to ignore the mean messages, assuring them the problem is being fixed. She wrote, "Sorry everyone. My Facebook Page and Twitter account has been hacked and we are cleaning it up." News Source : Om Rathore
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
DarkComet Remote Administration Tool v3.0 !

DarkComet Remote Administration Tool v3.0 !

Jan 13, 2011
DarkComet-RAT (Remote Administration Tool) is software design to control in the best condition and comfort possible any kind of Microsoft Windows machine since Windows 2000. This software allow you to make hundreds of functions stealthy and remotely without any kind of authorization in the remote process. This software is a long time project, started the August 2008, DarkComet-RAT is now one of the best and one of the most stable RAT ever made and totally free. – (that's what we like more about DarkComet RAT) This RAT provides most of the features provided by others. Download  DarkComet RAT v3.0   here News Source : Dark Commet
Digital Forensics Framework v0.9.0 latest version download !

Digital Forensics Framework v0.9.0 latest version download !

Jan 13, 2011
"DFF (Digital Forensics Framework) is a simple but powerful tool with a flexible module system which will help you in your digital forensics works, including file recovery due to error or crash, evidence research and analysis, etc. DFF provides a robust architecture and some handy modules." This is the change log: Lib EWF support : The LibEWF [1], developed by Joachim Metz, has been included as a connector. It provides support for Encase(R) file format (E01/S01 format). Bookmarks : It is now possible to bookmark interesting nodes and sort them by categories. The aim is to gather relevant files when performing analysis. Bookmarked nodes can then be used by other modules and also extracted. Advanced Hexadecimal viewer : Features used to resolve the DFRWS 2010 challenge [2] have been included. These features are very useful when studying unknown data structures or performing advanced files analysis. This upgraded version of the hexadecimal viewer provides three new visualization mo...
Wireshark 1.4.3 & Wireshark 1.2.14 Latest Version !

Wireshark 1.4.3 & Wireshark 1.2.14 Latest Version !

Jan 13, 2011
" Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education ." This update fixes many vulnerabilities such as the one with MAC-LTE dissector and the ENTTEC dissector. The following protocols have been updated – AMQP, ASN.1 BER, ASN.1 PER, CFM, CIGI, DHCPv6, Diameter, ENTTEC, GSM A GM, IEEE 802.11, InfiniBand, LTE-PDCP, LTP, MAC-LTE, MP2T, RADIUS, SAMR, SCCP, SIP, SNMP, TCP, TLS, TN3270, UNISTIM and WPS. You can now read captures via the Endace ERF, Microsoft Network Monitor and VMS TCPtrace file formats. For a complete list of changes, please refer to the 1.4.3 release notes. Download Wireshark v1.4.3 & Wireshark v1.2.14 here . News Source : Wireshark
Obama wants Internet ID for Every American !!

Obama wants Internet ID for Every American !!

Jan 13, 2011
Everyone in the UK will already be familiar with this story with the New Labour's plan for biometric identity cards.  That plan, which costs billions of pounds and was later shelved by the new coalition government, will now probably never happen in the UK. Now US President Barak Obama wants to increase Internet Security by creating an "identity ecosystem" for the Internet.  The US government is stressing this is not a national identity card system, though it would be hard to see how it would not be used as such by law enforcement and banks. A spokesperson said "We are not talking about a national ID card, we are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy; reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities." Many banking websites already use your existing card with a chip and pin reader to authenticate your usage....
Colorado Springs sent to prison for hacking into TSA computer !

Colorado Springs sent to prison for hacking into TSA computer !

Jan 13, 2011
A federal judge Tuesday sentenced a Colorado Springs man to two years in prison for trying to damage a high-security government computer system used to screen airline passengers. Judge David M. Ebel also ordered Douglas James Duchak to pay $60,587 in restitution to the U.S. Transportation Security Administration for repairs needed after he introduced a code into the system that would have disrupted the agency's ability to compare arrest warrants against the names of air travelers. According to court records, the incident occurred on Oct. 23, 2009, while Duchak worked at the TSA's operations center in Colorado Springs, days after he had been notified by a TSA contractor that his job was about to be terminated. Investigators said security cameras and other data showed Duchak entering the operation center after hours that night about the same time that the unauthorized code was entered. If activated, the code would have disrupted TSA's ability to vet names against its "no fly" list t...
Amazon Cloud Can Be Used to Hack Into Networks !

Amazon Cloud Can Be Used to Hack Into Networks !

Jan 13, 2011
A Germany-based security researcher says he can hack into protected networks using software that runs on Amazon's cloud-based computers, according to a Reuters report. Thomas Roth, a computer security consultant based in Cologne, Germany, says he has "figured out a quick and inexpensive way to break a commonly used form of password protection for wireless networks using powerful computers that anybody can lease from Amazon.com Inc over the Web," the report said. According to Roth, he can hack into protected networks using specialized software that he has written that runs on Amazon's cloud-based computers. It tests 400,000 potential passwords per second using Amazon's high-speed computers, according to Reuters report. Amazon offers pay-as-you-go Web services for companies who don't want to lay out the capital to purchase and run the equipment. The Seattle-based company just announced it lowered usage pricing on existing premium support offerings by 50 percent and added two new supp...
US Enhancing Online Security !

US Enhancing Online Security !

Jan 13, 2011
U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard Schmidt announced this month plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust. The announcement was made January 7th, at a forum with business and academic leaders at Stanford University. The National Program Office, to be established within the Department of Commerce, would coordinate federal activities needed to implement the National Strategy for Trusted Identities in Cyberspace, or NSTIC, an Obama administration initiative aimed at establishing identity solutions and privacy-enhancing technologies that will make the online environment more secure and convenient for consumers. The national office would serve as the point of contact to bring the public and private sectors together for this challenge. "The Internet will not reach its full potential until users and consumers feel more confi...
Anthony Scott Harrison suspended jail for capturing baking details from 2000 computers !

Anthony Scott Harrison suspended jail for capturing baking details from 2000 computers !

Jan 13, 2011
An Adelaide computer hacker has received a suspended jail term after infecting more than 2000 computers worldwide with a program to capture banking details. Anthony Scott Harrison, 21, used the internet to teach himself the necessary hacking and programming skills to launch his attack in 2009, but was caught when suspicious web activity was spotted and tracked by federal police. He also modified and sold software to allow others to infect computers, with his offending flowing from his obsession with the world of cyber fantasy. Advertisement: Story continues below Judge Paul Rice sentenced him to two years and eight months in jail to teach him and others it was a serious crime. "You may have offended locally, but the effects of your hacking can be felt worldwide in an instant," the judge said. He suspended the sentence and imposed a $500 good behaviour bond for three years. News Source : Google
Expert Insights Articles Videos
Cybersecurity Resources
//]]>