#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Press Release - Who are Anonymous & What Anonymous represents !

Press Release - Who are Anonymous & What Anonymous represents !

Feb 26, 2011
Just now, Anonymous hackers Release a new press note for the people of world. The words are as given below : Dear Citizens of the World. There has been some confusion among the media about who/what anonymous is/represents.  There have also been questions asked about the input from Anonymous during the current global revolution. Anonymous is an online pool of consciousness, sometimes we create a force towards a similar direction which could manifest in revolution. Anonymous has NO leader.  We are one.  We are many.  One does not speak for many. Many do not speak for all.  No one speaks for all. We come from all walks of life. All age, race, sex, places.  We have no ideologies. We have every ideology imaginable. We have no goals.  We have every goal imaginable.  To understand Anonymous would be to understand our universe.  Anonymous can not be labelled, blamed or made a scapegoat. To blame Anonymous would be to blame the citizens of ...
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN)

Feb 26, 2011
Chip.in - Technology Magazine website Hacked by TriCk & Assasin (ZHC & TeaMp0isoN) Link :  https://www.chip.in/forums/ Mirror :  https://mirror-az.com/mirror/?id=12689 News Source : TriCk & Assasin (ZHC & TeaMp0isoN)
BlackHole RAT : Mac OS X backdoor Trojan !

BlackHole RAT : Mac OS X backdoor Trojan !

Feb 26, 2011
' BlackHole ' is the latest remote administration tool (RAT) and is available both in Windows and Mac. Hacktool such RAT employs client-server program that communicates to its victim's machine through its trojan server. The server application is installed on the victim while the client application is on the managing side. The version suggest that ' BlackHole ' is currently in its early stage. However, the author seems to start showcasing the following functionalities: Remote execution of shell commands. Opens webpage using user's default browser. Sends a message which is displayed on the victims screen. Creates a text file. It is capable to perform shutdown, restart and sleep operation. It is capable to request for admin privileges. Here is an excerpt from the default text that is displayed in the full screen window with the reboot button: "I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE I...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Continuously Monitor Your Cyber Insurance Requirements

websitePreludeSecurity Control Validation
Quickly spot the critical control gaps that mean the difference between a successful claim or losing millions.
Motorola Xoom Gets Hacked In Under An Hour after Release !

Motorola Xoom Gets Hacked In Under An Hour after Release !

Feb 26, 2011
Despite just being released on February 24th, the Motorola Xoom has become the newest victim of developer rooting, and it took less than two hours to do it. Xeriouxly. The best part? The Clockwork Recovery running on it means that other developers can now create their own custom ROMs to hack whatever they want onto the tablet. Clockwork Recovery, also known as ClockworkMod, is a recovery console used on rooted Android Google devices, mainly using for flashing custom ROMs. It can make and restore backups, and it fairly straightforward to install too. The root was done by coder " Koushi ", pretty much as soon as he got his copy of the device home. In a blog post, he explained how he managed to get the custom root running so quickly. He got Clockwork Recovery running by building up a recovery (which he will not release yet due to the SD slot being non-functional at the moment) via  AOSP 's kernel and then using a ROM manager to get Superuser on the Xoom. He has a...
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN)

Indian United Nations & Football Association website's XSS Vulnerabilities found by TriCk (TeaMp0isoN)

Feb 26, 2011
Indian United Nations & Football Association website's XSS  Vulnerabilities found by TriCk (TeaMp0isoN) 1.) The FA (The Football Association) XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here 2.) Indian United Nations XSS Vulnerability - TriCk - TeaMp0isoN Link : Click Here News Source : TriCk - TeaMp0isoN | Via Email
Hackers Could Exploit Federal Government Shutdown !

Hackers Could Exploit Federal Government Shutdown !

Feb 25, 2011
The federal government's list of emergency network security personnel has not been updated in 15 years, putting national security at high risk if a shutdown takes place on March 4. The possible government shutdown scheduled for March 4, 2011 could trigger a cyberwar emergency. If non-essential government employees end up being furloughed in early March, the federal government's computer systems will be run by a shortlist of critical-need employees. One major problem: The federal government's list of critical-need computer security employees has not been updated in over 15 years. According to the influential Nextgov website, the government's emergency call-up IT security list was last updated in 1995, ahead of the last federal government shutdown. "In 1995, we already had that decided," said Hord Tipton, a former Interior Department chief information officer who was Bureau of Land Management assistant director for resource use and protection during the ...
Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Feb 25, 2011
Xss venerability in ' The Times of India ' website Found by Rahul Roshan ! Link : Click Here
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Feb 25, 2011
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download ! This cutting-edge volume takes network security professionals to the next level in protecting networks and web sites. Never-before-published advanced security techniques and concise explanations of core Internet infrastructure explain how to defend against devastating vulnerabilities in systems and the underlying network. With the authors' winning methodology for attack profiling and the theatre of war concept, you'll learn how to architect and prepare your network for threats that don't yet exist. By explaining specific in-depth technologies in use by not only the attackers, but also inside the applications they target, this book enables the reader to make better use of the tools available today, and to design new tools, techniques, and operational policies for the future. Download : Click Here
An Open Letter to PayPal from Anonymous Hackers !

An Open Letter to PayPal from Anonymous Hackers !

Feb 25, 2011
An Open Letter to PayPal from Anonymous Hackers ! Just Now  Anonymous Hackers Publish and open letter to Paypal , The Copy of Letter is as Given Below : Dear PayPal staff, In recent news (reference below) we took notice that you froze the account of Courage to Resist, the organization raising funds for legal support of U.S. Army Pfc. Bradley Manning. We regret to learn that after the massive protest in December 2010, PayPal has yet to appreciate  the untenable position they have found themselves in. PayPal stands at the epicenter of the  conflict of interests between the United States government and the First Amendment of the  United States Constitution. You are already aware that Bradley Manning's motives and reasoning  are politically grounded. However, his motives and/or reasoning are not and should not be any  concern to you. Additionally, by refusing to process the aforementioned legal funds you are  patently interfering with the defendant...
Cyber crime Complaints in US Fell by 10% in 2010 !

Cyber crime Complaints in US Fell by 10% in 2010 !

Feb 25, 2011
The U.S. agency that tracks complaints of criminal activity on the Internet reported Thursday that fewer people complained about Internet fraud in 2010 than in the previous year. The Internet Crime Complaint Center (IC3) runs a Web site where victims can report details of any cyberfraud. It shares the data with law enforcement agencies to help them hunt down criminals. Last year it received 303,809 complaints, almost 10 percent fewer than the previous year's total of 336,655. The IC3 is run by the U.S. Federal Bureau of Investigation and the National White Collar Crime Center. It released its annual report Thursday, based on data submitted in 2010. The largest single source of complaints was from people who had been duped by criminals posing as buyers and sellers. International scammers, preying on eBay and Craigslist users, have made millions over the past decade. Just last week, a Romanian national, Adrian Ghighina, pleaded guilty to his role in a scam that took in $2.7 ...
Google tweaks Search algorithm to reduce the search spam !

Google tweaks Search algorithm to reduce the search spam !

Feb 25, 2011
Google has warned that search rankings will be changing after it refined its systems to weed out content farms and other search spammers. Changes made in the last 24 hours have "noticeably impacts" on around 12 per cent of search queries. The changes are designed to block out so-called content farm – sites which contain a large amount of copied or poor quality content. Instead sites which contain original content, research and analysis will receive preferential treatment. " We can't make a major improvement without affecting rankings for many sites. It has to be that some sites will go up and some will go down ," said the  Google blog . "It is important for high-quality sites to be rewarded, and that's exactly what this change does." Google said that the changes had not been influenced by the results of its Chrome Blocklist extension, which was launched last week. However it said that the top few dozen sites it had downgraded matched the data from the extension by 84 per cent. Th...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>