#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Julian Assange's hacking offences revealed in Australian court documents !!

Julian Assange's hacking offences revealed in Australian court documents !!

Jan 19, 2011
IN 1991, using just a "simple, basic computer" from his home in suburban Melbourne, a young Julian Assange created a program that allowed him to access about 11,000 computers belonging to the giant Canadian telecommunications company Northern Telecom. New details of the WikiLeaks founder's early computer hacking-related offences have emerged in court documents released toThe Australian under an application to the Victorian County Court. The documents include a transcript of Mr Assange's 1996 pre-sentencing hearing for 24 computer-related offences, including accessing a server of Northern Telecom. While offering an insight into his unstable childhood, the documents also show the controversial website creator already displayed remarkable computer skills in his early adult life. In its submissions to County Court sentencing Judge Leslie Ross in December 1996, the prosecution described Mr Assange, then 25, as a far more sophisticated hacker than two other men char...
Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t...
OECD said Cyber attacks could create 'perfect strom' !!

OECD said Cyber attacks could create 'perfect strom' !!

Jan 19, 2011
Attacks on computer systems now have the potential to cause global catastrophe, but only in combination with another disaster, the Organisation for Economic Cooperation and Development (OECD) said in a report on Monday. The study, part of a wider OECD project examining possible "Future Global Shocks" such as a failure of the world's financial system or a large-scale pandemic, said there were very few single "cyber events" that could cause a global shock. Examples were a successful attack on one of the technical protocols on which the Internet depends, or a large solar flare that wiped out key communications components such as satellites. But it said a combination of events such as coordinated cyber attacks, or a cyber incident occurring during another form of disaster, should be a serious concern for policy makers. "In that eventuality, 'perfect storm' conditions could exist," said the report, written by Professor Peter Sommer of the London Sch...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
FBI to press criminal charges over AT&T iPad user data hack !

FBI to press criminal charges over AT&T iPad user data hack !

Jan 18, 2011
Remember last summer when iPad users on the AT&T network in the US were subject to a hack that allegedly saw around 120,000 customers personal details compromised? The FBI certainly remembers and today it is set to reveal details criminal charges relating to the case, according to Reuters. As we reported at the time, hackers seemingly obtained access to the database of 3G iPad owners and their email addresses. The data was obtained by executing a brute force attack on the AT&T website. AT&T offered a convenient way of letting users log into their 3G data plan accounts, auto-populating users email address on the dashboard by referencing the unique identifier (ICC-ID) of the users iPad. AT&T allowed log into their 3G data plan accounts, auto-populating their email addresses on the dashboard by referencing the unique identifier (ICC-ID) of their iPad. It appeared at the time that the hackers produced a script that auto-generated thousands of unique ICC-IDs, harvesting...
11 Websites hacked by team Jmc H4x0rs !

11 Websites hacked by team Jmc H4x0rs !

Jan 18, 2011
11 Websites hacked by team Jmc H4x0rs ! Hacked Sites : https://tronix.se/ oscommerce2st/catalog/images/ jmcc.html https://www.colecionismo.com. br/loja/images/jmcc.html https://danawa.jp/images/jmcc. html https://www.solarinformatica. com.ar/catalog/images/jmcc. html https://www.boutiquespk.ca/ images/jmcc.html https://www.matech.pl/sklep/ images/jmcc.html https://www.steinkartei.de/ images/jmcc.html https://toy.lt/images/jmcc.html https://www.hiphopdt.de/shop2/ images/jmcc.html https://www.eshoping.lt/ hobbystore/images/jmcc.html https://shop.aplusmoto.ch/ catalog/images/jmcc.html News Source : Jmc H4x0rs | Via Email 
Hacking kits making Cyber Crime Easy !

Hacking kits making Cyber Crime Easy !

Jan 18, 2011
The incidence of cybercrime is set to increase with the proliferation of pre-made hacking software able to be used by less sophisticated criminals, research suggests. IT security software maker Symantec said attack toolkits are becoming more accessible and easier to use, allowing criminals with little technical expertise to turn to cybercrime. The kits can facilitate widespread attacks on computer networks, enabling the launch of pre-written threats, but with certain customised characteristics. Advertisement: Story continues below "In the past, hackers had to create their own threats from scratch," Symantec Australia and New Zealand managing director Craig Scroggie said. This limited the number of hackers, but toolkits are now enabling more people to be involved in cybercrime. A cybercriminal ring was busted late last year over the theft of over $70 million from online banking and trading accounts, allegedly using a kit known as Zeus, Symantec said. "The simplicity, acc...
Phone Creeper v0.98 latest version download !

Phone Creeper v0.98 latest version download !

Jan 18, 2011
" Phone Creeper is a phone espionage suite It can be silently installed by just inserting an sd card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controled by sms text messages. All commands will be silently received and deleted immediately and results will be issued back to sender.  Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default, this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device . " This is the change log: GETPOS command for GPS location now just grab and sends on demand to minimize battery & CPU usage Block list will now also block SMS messages from users in list also, not just calls. Emergency contact and SIM detection features fixed up. GPS google map...
Maltego v3.0.3 - Latest version Download !

Maltego v3.0.3 - Latest version Download !

Jan 18, 2011
"Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego's unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure. Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format" This release offers a fantastic amount of stability and most importantly speed to Maltego. This release also has an updated user guide! Download Maltego v3.0.3  here
Best 5 Cookie Managers tools download !

Best 5 Cookie Managers tools download !

Jan 18, 2011
Free the Top 5 Cookie Managers are , We hope iif you have any other free better known Cookie Managers help us contribute to the list. 1) Cookienator 2.5.32 Cookienator is a tool that will help you remain anonymous from search engines such as Google and other notorious web-usage trackers such as Doubleclick or Omniture. Many websites install cookies in your browser, and these little bits of tracking data will be used to identify you for as long as you keep using your computer. In the past few years I have been alternating between religiously clearing my cookies from time to time, or neglecting to do so with hope that these corporations will live up to their vague promises of doing no evil. Then I decided that it'd be more productive to automate the whole thing, so I spent a good chunk of a weekend creating the first version of Cookienator, a simple program that will leave most of your cookies alone but will remove the ones that put your privacy at risk. It lets users delete evi...
aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

Jan 18, 2011
aidSQL is a PHP application provided for detecting security holes in your websites. It is a modular application, meaning that you can develop your very own plugins for SQL injection detection & exploitation. Sample usage of aidsql: ./aidSQL --url=www.sample123.com We find it similar to nikto, whatweb and others. One good feature is that we can get a reverse basic shell once exploited. It also has a simple shell script which will run aidSQL and do some checking for PHP. You can also Google through this application and look up for sites. It also includes a primitive crawler. Download aidsql (aidsql-devel-01102011.tgz) here News Source : Google
Rapper Lil Wayne's Twitter account hacked !!

Rapper Lil Wayne's Twitter account hacked !!

Jan 18, 2011
Rapper Lil Wayne has become the latest victim of web hackers when his Twitter account was compromised by an internet prankster. The 28-year-old hip hop star has suspended his Twitter account after the hacker sent a number of objectionable messages to his fans and followers, reported Contactmusic. The 'Lollipop' hitmaker's page was illegally accessed on January 16 and rude messages were sent to his celebrity pals which included 50 Cent, Soulja Boy and The Game. The hacker also posted explicit jibes about the rapper's recent spell in prison on weapons possession charges. One of the post sent to Soulja Boy reads, "I sent a donations (sic) to your Paypal, check it, I heard you got 13,000 (record) sales lil homie, I feel bad for you!" Wayne's page was also hacked last year where the prankster posted fake news of the rapper performing with Nicki Minaj. His account has now been taken offline. News Source : Times of India
Expert Insights Articles Videos
Cybersecurity Resources
//]]>