#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hackers Hijack YouTube Official North Korea, Twitter Accounts !

Hackers Hijack YouTube Official North Korea, Twitter Accounts !

Jan 22, 2011
Hackers Hijack YouTube Official North Korea, Twitter Accounts Online piracy has had a dangerous goal this weekend when they hacked youtube North Korea's official and Twitter accounts. Rather than strictly content Pyongyang's YouTube channel, the hacker posted a video cartoon version of the son of dictator Kim Jong-il and heir, Kim Jong-un, driving a luxury sport utility vehicle in a number of starving Register reported. The video parody surface Saturday (Jan. 8), the anniversary of Kim Jong-un. North Korea's official Twitter page used to send several scathing attacks on the leadership of the country, including one who chastised Kim Jong-il spend money on a nuclear weapons program, while 3 million people starving and freezing to death. " It is unclear who initiated the online sabotage, but Reuters reported that several members of the South Korean Internet forum called Dcinside claimed responsibility for the prank. News Source : Google
Facebook Flops On The Sale Of The User's Address, Telephone Numbers !!

Facebook Flops On The Sale Of The User's Address, Telephone Numbers !!

Jan 22, 2011
Facebook made a rapid retreat Monday (January 17) announcing that it would "temporarily" disable the functionality of a new brand that allows applications to third harvest phone numbers of users and home addresses. The function began with a blog Facebook quiet afternoon Friday, January 14. He said the device would allow users to "easily share your address and cell phone with a shopping site to streamline the buying process, or you subscribe to the minute special offers directly to your mobile phone." In other words, Facebook has been giving advertisers and third-party application developers access to the numbers of mobile users and addresses. Over the weekend, were sentenced by security experts and based privacy advocates. "It does not take long for crooks to take advantage of this new facility for their harmful intentions," said Graham Cluley, senior consultant for security firm Sophos, the British. Users would allow application developers to...
Beware Of Phishing Scams, Vishing, And Other Smishing !

Beware Of Phishing Scams, Vishing, And Other Smishing !

Jan 22, 2011
Better Business Bureau has published a list of top 10 scam that seems not only to the biggest scam in 2010, but what to watch in 2011. In no particular order, here they are: Door to door scams Each of the new season of the show to attract new scammer port provides an incredible offer: Roofing in the spring, paving contractors in the summer and heating contractors in the fall. These entrepreneurs fraudulent use of high pressure sales tactics to scare people with expensive even worse - a job that is not the way to contact them if you do not - and often useless. Tip: Do not give in to high pressure sales tactics. Take the time to do your due diligence, to obtain the name and location of the company and ensure all the details and verbal promises are included in the contract. If you do not sign the agreement and would like to change my mind, BC law, if it was door to door sales contract after you have 10 days to withdraw from advising the company. Suspicious door-to-sale must infor...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
Worm Virus Twitter Scam Push Rogue !

Worm Virus Twitter Scam Push Rogue !

Jan 22, 2011
Thousands of Twitter users are believed to have been struck with malicious links tied to a rogue anti-virus hoax circulating the microblog service. Scam is spreading malicious links goo.gl wrong URL shortening services. According to Kaspersky Lab, malicious links to redirect users to different areas with "m28sx.html page. This is an HTML page directs users to a static domain, the Ukrainian top-level domain. From there, the blog of Senior Research Kaspersky Lab Malware Researcher Scientist Nicolas Brulez, the domain name directs the user's IP address, press the fake antivirus. "Once on this site," Burn blog, "I [a] warning that your machine is running suspicious applications and invite you to explore. ... The user is prompted to remove all threats to your computer and download a fake antivirus application [sic] called "Safety Shield." Del Harvey, Director of Trust and Security on Twitter, tweeted about the day that the company aims to remove the ...
3 Websites hacked by Cyber pr3dat0r (Team StuXnet)

3 Websites hacked by Cyber pr3dat0r (Team StuXnet)

Jan 21, 2011
3 Websites hacked by Cyber pr3dat0r (Team StuXnet) Hacked Links :  https://www.vendstream.com/portals/0/cyber.txt https://www.hqex.net/index.html https://www.pumpsandpressure.com/portals/0/cyber.txt News Source : Cyber pr3dat0r (Team StuXnet) | Via Message
Sri Lanka Army Tender Management System's site Hacked By Pakistan Cyber Warrior !!

Sri Lanka Army Tender Management System's site Hacked By Pakistan Cyber Warrior !!

Jan 21, 2011
Sri Lanka Army Tender Management System 's site Hacked By Pakistan Cyber Warrior !! Site link :  https://tender.army.lk/
2 Indian websites Hacked By Team Flawless (Pakistan Hackers) !

2 Indian websites Hacked By Team Flawless (Pakistan Hackers) !

Jan 21, 2011
2 Indian websites Hacked By Team Flawless(Pakistan Hackers) ! Links:: https://ktvchannel.in/TeamFlawless.htm https://www.sixer.in/pictures/vids_api/TeamFlawless814.htm Mirrors: https://zone-h.org/mirror/id/12930377 https://mirror-az.com/mirror/?id=9810 https://mirror-az.com/mirror/?id=9809 News Source : aBu-HurrerA | Via Email
Punjab Education Department E-mail Hacked !!

Punjab Education Department E-mail Hacked !!

Jan 21, 2011
Hoshiarpur : In an incident that has left teachers in schools in Hoshiarpur district of Punjab face red, the official email address of the school board here has been pirated and pornographic material was distributed to 400 public schools in the district. "We are using this e-mail address to send notifications and important information to schools in Hoshiarpur. This is a case of cyber-attack as someone sent pornographic material to all schools after hacking the e-mail, Sukhwinder Kaur, Deputy District Education Director (WD), Hoshiarpur, told IANS. After the accident, the police made an appeal DEO. "It was really embarrassing that the majority of teachers in computer services at the school are women. These things are not tolerable, and we are all shocked by this incident. Upon receipt of this information, he immediately instructed schools not to open emails mails sent from this address, "said Kaur. Sources indicate that the attacker has sent between 15 and 20 em...
Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Jan 21, 2011
What is the future of political protest, as in a highly digitized world? We follow the real-time display via Wikileaks Cablegate. The day of the cables has been convicted for release in major newspapers worldwide, called a "political hack" cut the Wikileaks site with a distributed denial of service (DDoS). Later he wrote about Twitter that he went after the site for "attempting to give life to our troops and other assets." Wikileaks Swedish webhost moved the site owned by Amazon.com and Elastic Computing Cloud (EC2) in Ireland. When Senator Joseph Lieberman contact the hosting site, Amazon, Amazon Wikileaks to stop the service, citing terms of use. Then the free-for-all began. The pirates were involved, this time on behalf of Wikileaks, directed to Amazon. When PayPal froze payments to Wikileaks, the anonymous group of hackers, who organized the attacks on Amazon, focusing on reducing the site to pay online. When MasterCard announced that it would cease opera...
Where To Buy Your Tools From Hackers ?

Where To Buy Your Tools From Hackers ?

Jan 21, 2011
Software that facilitates the attack by beginners online scammers and the future is big business anarchists, says Karlin Lillington The suites are equipped with new software with all the trappings of modern software now offers: cloud computing hosting, software as a service (SaaS) functions, outsourcing, digital certificates, licenses to prevent piracy, software modules, and provided services and support packages. But the difference between these programs - listed in the Internet Relay Chat rooms, instant chat (IRC) and private online forums - and what it could buy public providers is that they offer more software piracy increasingly sophisticated for simple - young hackers with little ability to write their own computer code. "Lessons learned from large companies legitimate software - such as development practices, techniques and anti-piracy, support and prices - are regularly repeated in the informal economy, in order to increase efficiency and profits, says the safety re...
Hackers Steal 100,000 E-mail !

Hackers Steal 100,000 E-mail !

Jan 21, 2011
Two attackers were more than 100,000 e-mail users Apple iPad, including politicians and famous journalists, federal prosecutors said Tuesday notifying the prosecution of men. AT & T has revealed a vulnerability of months ago, and U.S. Attorney Paul Fishman said there was evidence that the two men have used the information obtained for criminal purposes. Authorities warned, however, that information can be dissolved in the hands of spammers and scammers. Daniel Spitler, a guard from the library 26-year-old from San Francisco and Andrew Auernheimer, 25, of Fayetteville, Ark., is accused of fraud and conspiracy to access a computer without authorization. Fishman characterizes men and their cohorts that participation in a "malicious upsmanship, as they sought to impress others and others in the online community. "We do not tolerate crimes committed for street cred," said Fishman. "Hacking is not a competitive sport, and security breaches is not a game....
Expert Insights Articles Videos
Cybersecurity Resources
//]]>