#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hackers Steal 2 Million Tonnes Of Carbon Credits In The EU !

Hackers Steal 2 Million Tonnes Of Carbon Credits In The EU !

Jan 21, 2011
Hackers have stolen two million tons of pollution rights in a raid five days this week in the carbon system of the EU, an EU source said Thursday. The amount of the stolen carbon credits in the online action, as a spokesman for the European Commission said was "maybe unified" represent only a fraction of the global industrial emissions permits gas greenhouse, but it is potentially worth several million euros. The magnitude of the theft, which involved five EU countries without a name, was revealed a day after Brussels has closed all 27 national records sales organization for a week, citing insufficient protection online. Credits just stolen from the Czech Republic amounted to € 7,000,000. Fourteen of the 27 states of the European Union must strengthen its security in line with the minimum standards, the spokesman said. The European Union Emissions Trading Scheme (ETS) is the largest multinational greenhouse gas emissions trading scheme in the world, but suffered re...
Hackers Steal $ 150,000 Malware Job Search !

Hackers Steal $ 150,000 Malware Job Search !

Jan 21, 2011
Small businesses are worried about a new scam: criminals in search of work who want to break into online bank accounts. The U.S. Federal Bureau of Investigation issued a warning Wednesday on a new version of a fraud technique called long-term computer automated information exchange fraud. With ACH fraud criminals to install malware on their computers and small businesses use to access online bank account of the company. They created a fake transfer of funds, adding fake employees or beneficiaries, and move the money offshore. Scammers can move hundreds of thousands of dollars in a few hours with this technique. Often target small businesses that use regional banks or credit unions, which often lack the resources to identify and block fraudulent transfers. This is the last resulted in a scam, criminals are apparently looking for companies that use on-line and then send malicious programs, which seems to have falsified job applications. An unnamed U.S. company recently lost $ ...
CIO said - London Olympics Will Be 'ready' For Cyber-attacks !!

CIO said - London Olympics Will Be 'ready' For Cyber-attacks !!

Jan 21, 2011
London Olympics will be well prepared for attempted cyber attack, according to CIO Gerry Pennell London 2012. Speaking in London to start in 2012, and Atos Origin IT testing organization, Technology Lab, Pennell said the attacks at the Olympics - is also trying to overthrow the Games, to influence the results data and DDoS attacks on the pages of the event - were predictable. The former interior minister David Blunkett has also felt the impact of cyber attacks at the Olympics in 2009. Pennell said: "We have cyber attacks, certainly the previous games have always been attacked, then we will be attacked .. "We work with partners and government to ensure that we have the right of defense." With access to the laboratory of Technology, Atos and London of 2012 was 200 000 to start testing the entire Olympic Games IT infrastructure that is flexible, adaptable to change and secure. For example, scenarios such as computer room fire, or a virus, will be tested in real t...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
The World Now, "Third Age" Cyber Crime  !

The World Now, "Third Age" Cyber Crime !

Jan 21, 2011
The year 2010 was a crime of great team and could prove to mark the beginning of a "third age" of computer crimes, security expert Graham Cluley of Sophos, said before the review of the latest threats Company year. The first period was marked by amateur hackers and virus creation on the PC, the second by the merger of organized crime with new Internet technologies, and as expected 2010 has seen a lot on both fronts in ways each increasingly sophisticated and varied. That the points during the year, the criminals seem to be moving some of the old-fashioned junk mail and use their websites to incorporate crime e-mail, Battlefront, social networks. "The scale subversive activities, Facebook seems out of control," said report co-author, Graham Cluley. "Social media sites, however, unable or unwilling to invest the resources necessary to stamp out," he writes, the last line of stinging comments made in recent months is evident satisfaction of security. ...
Z-Company Crew Deface Cochin Port Trust Site !!

Z-Company Crew Deface Cochin Port Trust Site !!

Jan 20, 2011
Z-Company Crew Deface Cochin Port Trust Site !! Link :  https://cochinport.gov.in/index.html Zone-H Record :  https://zone-h.com/mirror/id/12931163 News Source : Z-Company Crew
Areuhot.info Hacked By Mack (Team Nuts)

Areuhot.info Hacked By Mack (Team Nuts)

Jan 20, 2011
Areuhot.info Hacked By Mack (Team Nuts) Hacked Link :  https://areuhot.info/banners/nuts.htm News Source : Mack (Team Nuts) | Via Chat
PCA hack CBI Through The Creation Of Proxy Server from Other Three Countries !!

PCA hack CBI Through The Creation Of Proxy Server from Other Three Countries !!

Jan 20, 2011
The research on hacking the website of the IWC by the Pakistan Army Cyber (PCA) revealed that Islamabad were able to overcome the first line by creating proxy servers. CBI has traced these servers in Pakistan, United States (California), Indonesia (Jakarta) and Latvia. CBI source said, "the IP addresses shows that the CBI, the site was hacked in Pakistan. However, baffles scientists Pakistan created the three proxy servers in three other countries." Investigators believe that the Pakistani intelligence service ISI, played a major role in the hacking site IWC. Agency, which has registered a complaint against piracy, December 5, is now sending letter rogatory (LRS) of these four countries for information on servers and creators of IP addresses. CBI site, linked to the Interpol database of criminals, was restored a week ago by the National Informatics Centre (NIC). PCA hacked the site on December 3, hacking revenge 36 portals of Indian Cyber Pakistani Army on Novembe...
Pirated Content Sites Hacked Attract Billions Of Years !

Pirated Content Sites Hacked Attract Billions Of Years !

Jan 20, 2011
Web sites hawking pirated software and other digital goods will attract about 53 million visits per year. This is according to a report (PDF) released yesterday by MarkMonitor, a company that protects online brands to its corporate clients. The hacking scene of the majority of the 53 billion hits, while those who sell counterfeit goods such as counterfeit prescription drugs and luxury items accounted for a significantly smaller amount of traffic: about 92 million visitors per year. MarkMonitor has identified 43 sites that participated in digital piracy. Among them, three sites -. Rapidshare, Megaupload.com and Megavideo.com-represented about 21 billion hits a year. Of course, these sites say they discourage the downloading and sharing copyrighted material through their conditions of service. In response to the findings of MarkMonitor, issued the following statement RapidShare.com he e-mailed to CNET: "We read the study unpleasant brand of US-protection company MarkMonito...
Israel Tested For The Virus Linked To Iran's Nuclear Boredom !

Israel Tested For The Virus Linked To Iran's Nuclear Boredom !

Jan 20, 2011
The intelligence services of Israel and the United States collaborated in the development of a computer virus that have sabotaged nuclear centrifuges to Iran and a slowdown in its ability to develop a nuclear weapon, the New York Times reported Sunday. The newspaper reported that Israel has tested the effectiveness of worm Stuxnet its nuclear complex at Dimona in the Negev desert, before releasing him. The report quoted intelligence and military experts and officials say that the effort to create the worm Stuxnet was a joint US-Israeli project, which also had the cooperation of Britain and Germany. "You can control the worms, you need to know the machines," American expert told the Times. "The reason for the worm to be effective, that the Israelis have tried," he added. These days, the Times said the outgoing head of the Israeli intelligence agency Mossad, Meir Dagan, and Secretary of State, Hillary Rodham Clinton announced separately that they believed Iran...
Two men charged for Hacking into AT&T Website !

Two men charged for Hacking into AT&T Website !

Jan 20, 2011
Two men were arrested on Tuesday and are facing charges of fraud and conspiracy to access a computer without authorization, following an investigation that started with last year's much publicized harvesting of e-mails and AT&T authentication IDs of 114,000 early-adopters of Apple's iPad. According to the NYT, Daniel Spitler of San Francisco and Andrew Auernheimer of Fayetteville - members of a group calling itself Goatse Security that has a history of warning about security vulnerabilities - are the only ones who will be prosecuted for the breach, even though the group counts some ten members altogether. The likely reason for this decision on the part of the district attorney is that the prosecution possesses a transcript of chat logs between Spitler and Auernheimer, in which they discuss the way they accessed the information and muse on how to use it. And even though there is no proof or indication that they intended to sell the information, they shared the script t...
Malware and phishing increasing via social networks !

Malware and phishing increasing via social networks !

Jan 20, 2011
By mid-2010, Facebook recorded half a billion active users, making it not only the largest social networking site, but also one of the most popular destinations on the web. Unsurprisingly, this massive and committed user base is heavily targeted by scammers and cybercriminals, with the number and diversity of attacks growing steadily throughout 2010 – malware, phishing and spam on social networks have all continued to rise in the past year, with a Sophos survey finding that: 40% of social networking users quizzed have been sent malware such as worms via social networking sites, a 90% increase since the summer of 2009 Two thirds (67%) say they have been spammed via social networking sites, more than double the proportion less than two years ago 43% have been on the receiving end of phishing attacks, more than double the figure since 2009. "Rogue applications, clickjacking, survey scams – all unheard of just a couple of years ago, are now popping up on a daily basis on social netwo...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>