-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Privacy Flaw Found in Tor Project !

Privacy Flaw Found in Tor Project !

Dec 31, 2010
At the  Chaos Computer Club Congress  here Tuesday, researchers from the University of Regensburg delivered a new warning about the  Tor anonymizer network , a system aimed at hiding details of a computer user’s online activity from spying eyes. The attack doesn’t quite make a surfer’s activity an open book, but offers the ability for someone on the same local network — a Wi-Fi network provider, or an ISP working at law-enforcement (or a regime’s) request, for example — to gain a potentially good idea of sites an anonymous surfer is viewing. “Developers have to be aware of this kind of attack, and develop countermeasures,” said Dominik Herrmann, a Regensburg Ph.D student studying profiling and fingerprinting attacks. “But that proves to be very difficult.” The research, performed by a variety of collaborators in Germany working on anonymity measures, represents a warning for privacy-conscious users wary of spying eyes, whether behind net-unfriendly borders or simply corpo...
Panda predicts malware creation and cyberwars will be key features of 2011 security landscape !

Panda predicts malware creation and cyberwars will be key features of 2011 security landscape !

Dec 31, 2010
In its 2011 IT security predictions, Panda Security is predicting that a further rising tide of malware, along with an online cyberwar plus cyberprotests, will be the order of the day as the year progresses. According to Luis Corrons, Panda's technical director, during 2010 we have seen a significant growth in the amount of malware, a constant theme over the last few years. "This year, more than 20 million new strains have been created, more than in 2009. At present, Panda's collective intelligence database stores a total of over 60 million classified threats. The actual rate of growth year-on-year however, appears to have peaked: some years ago it was over 100%. In 2010 it was 50%. We will have to wait and see what happens in 2011", he said in a security blog. Corrons added that, also during 2010, with Stuxnet and the WikiLeaks cables suggesting the involvement of the Chinese government in the cyberattacks on Google and other targets, a turning point in the hist...
4chan back online after being downed by DDoS attacks !

4chan back online after being downed by DDoS attacks !

Dec 31, 2010
A coordinated DDoS attack from an unknown source temporarily knocked 4chan offline in the latest attack against the high-profile group. The 4chan forum helped to create and cultivate the Anonymous hacker group that has used DDoS attacks against numerous companies in recent months as part of Operation Payback. 4Chan’s site was down for more than 24 hours, but is back online after suffering its most damaging attack as of late. The site has continued to gain more notoriety as WikiLeaks remains in the headlines, and DDoS attacks aren’t uncommon against 4chan. As part of Operation Payback, the Anonymous group attacked a number of websites of companies that were standing up against WikiLeaks. Credit card companies such as Visa, MasterCard and PayPal cut direct ties with WikiLeaks, cutting off donations to the site. Anonymous then targeted the websites of these companies with coordinated DDoS attacks, causing many hours of downtime. Other groups and political figures were targeted for speakin...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
142 Websites Hacked By Tn-V!Rus and salvana !!

142 Websites Hacked By Tn-V!Rus and salvana !!

Dec 31, 2010
142 Websites Hacked By Tn-V!Rus and salvana !! Hacked Websites : http://esmediagroup.co.uk/team.htm http://zionmoto.co.uk/team.htm http://yourdojo.co.uk/www-stats/team.htm http://youngbucks.co.uk/images/team.htm http://xcelconcepts.com/www-stats/team.htm http://windrushedenvillas.com/images/team.htm http://le-tour-new-york.com/team.htm http://le-tour-zurich.com/team.htm http://le-tour-paris.com/team.htm http://le-tour-munich.com/team.htm http://le-tour-dubai.com/team.htm http://le-tour-berlin.com/team.htm http://le-tour-amsterdam.com/team.htm http://le-tour-amsterdam.com/team.htm http://le-tour-berlin.com/team.htm http://le-tour-hamburg.com/team.htm http://le-tour-geneva.com/team.htm http://oxygenleads.com/team.htm http://thefatauntie.com/bank/team.htm http://twilliamsdesign.co.uk/team.htm http://whitehorsescientific.co.uk/team.htm http://www.wilderlogistics.com/team.htm http://www.wilderlogistics.com/team.htm http://vrolok.co.uk/team.htm http://wealthpro...
Engineering student arrested in Bhopal for hacking bank accounts !

Engineering student arrested in Bhopal for hacking bank accounts !

Dec 29, 2010
An engineering student has been arrested in Bhopal for hacking third party bank accounts to book railway and air tickets, police said. Sunny Kumar (20), a student of private engineering college, was arrested by Cyber Cell police on Tuesday for hacking third party accounts for transferring cash to book the tickets to those who asked him for them, Inspector General of Police (Cyber Cell), R K Mishra said. As he had no money in his account, Sunny gave heavy discount to his friends and acquaintances to earn money, Mishra said adding he used Internet banking for  committing the crime. However, Sunny generated the tickets in the name of the persons who wanted booking, he said. Action was taken against him after police received complaints from several persons that their bank statements showed money withdrawn for railway and air e-tickets without their knowledge, the IG said. Sunny hails from Bihar and has been living in a rented house, Mishra said. Cyber Cell officials are scanning the b...
Millions of customer's email addresses stolen from Honda !

Millions of customer's email addresses stolen from Honda !

Dec 29, 2010
American Honda says it has contacted millions of its customers after hackers stole a database containing names, email addresses, and VINs (the Vehicle Identification Number, or unique 17 character ID for your motor vehicle). The obvious danger is that cybercriminals might use the list to send out emails to Honda customers, designed to trick them into clicking on malicious attachments or links, or fool them into handing over personal information. After all, if the hackers were able to present themselves as Honda, and reassured you that they were genuine by quoting your Vehicle Identification Number, then as a Honda customer you might be very likely to click on a link or open an attachment. For that reason, Honda has contacted all of the 2.2 million customers it believes may have been affected by the security breach. According to a  report by the Columbus Dispatch , the data was stolen from a third-party company who sent out "Welcome" emails to customers who created accounts w...
China said that needs 'more Internet security' !

China said that needs 'more Internet security' !

Dec 29, 2010
China should invest more in its own Internet security, lest it become a victim, or even scapegoat, for international hacking activities, an industry expert said on Tuesday. " Our current protection input is not enough, and the scale and size is far less intensive compared to that of Europe and the United States, " Su Hao, an expert on international security at the China Foreign Affairs University, told  China Daily . Su was referring to a recent news source in Germany, which again singled out China for suspicion of cyber attacks. The report said Germany in 2010 detected a sharp rise in hacking activities - a large number of which it claimed may have been from China. "There has been a sharp rise in so-called electronic attacks on the networks of German government and local authorities," Interior Ministry spokesman Stefan Paris told a regular government briefing. Paris was quoted by the AFP as saying that "China is playing a large role in this". The report i...
Abuse of social networking sites misused among youth in Kochi !

Abuse of social networking sites misused among youth in Kochi !

Dec 29, 2010
while engaging in online social networking sites seemed to have yielded little results, if the statistics and current trends are any indication. The Cyber Cell of the City Police has received more than 40 complaints of abuse of social networking sites like Orkut and Facebook this year itself. In one such case reported last month, a student union leader of a leading college in the city complained of someone making a fake profile of his on Facebook and inviting friends. The fake identity was circulated among the original friend list, along with the message that the original identity has been hacked. The complainant lodged the petition when the suspect also started making pestering calls to his mobile phone and threatened to make complicate things if any attempt was made to stop him. The suspect was tracked to Saudi Arabia, where he was operating a ‘rent-a-car' service. Since none of the immediate relatives of the suspect were available at the home address at Thalassery, the police c...
CERT-In to assist Kerala to beef up Cyber Security

CERT-In to assist Kerala to beef up Cyber Security

Dec 29, 2010
Recently a spate of defacements has been reported from websites pertaining to Kerala. As per the statistics available with the Computer Emergency Response Team Kerala (CERT-K), as many as 40 odd websites from Kerala were hacked in the last six weeks. Random messages on social networking sites hint at the possibility of further attacks by December 31, 2010. Realising the need to strengthen security incident response as well as to take proper proactive steps, the Indian Computer Emergency Response Team (CERT-In) will be sending three of their experts to Kerala to share their knowledge and experience with the officials here to ensure cyber safety and security. Accordingly, CERT-K in association with the Kerala State IT Mission (KSITM) is organising a workshop on ‘Security Incident Response’ on December 29 for System Developers and Administrators of various Government Departments at the Institute of Management in Government (IMG) in Trivandrum. Hacking Methodology and Detection of attacks...
Adaptive Security Analyzer IIS : A Tool to Protect Windows Based Web Servers !

Adaptive Security Analyzer IIS : A Tool to Protect Windows Based Web Servers !

Dec 29, 2010
Adaptive Security Analyzer IIS or the ASA IIS protects Windows-based web servers from known and unknown vulnerabilities like Directory Traversal, Buffer Overflow, Parser Evasion, High-bit Shellcode, Remote Data Services , In addition to the above, it also protects them from various types of internal system misuse. ASA IIS is comprised of two key components. The first is implemented as an ISAPI filter which collects and feeds data to the Adaptive Security Engine (ASE) . Leveraging a breakthrough combination of applied mathematic and cybernetic approaches that enable machine learning and analysis of the network security information, ASE continuously monitors the vital aspects of IIS operation. ASE detects abnormal requests and other unusual traffic enabling ASA IIS to prevent any type of activity which could be harmful to the network . We are also testing this tool in our test environment . We think that it will be very useful for small organizations to be pr...
Report : Top Hacker Targets Include Mobile Devices and Mac !

Report : Top Hacker Targets Include Mobile Devices and Mac !

Dec 29, 2010
McAfee is making security predictions for 2011. The firm outlines its top threats for next year in the 2011 Threat Predictions report -- and Android, iPhone, Foursquare, Google TV, and Mac OS X are listed as major cybercrime targets. Politically motivated attacks are also expected to increase, a la WikiLeaks. "We've seen significant advancements in device and social-network adoption, placing a bullseye on the platforms and services users are embracing the most," said Vincent Weafer, senior vice president of McAfee Labs. "These platforms and services have become very popular in a short amount of time, and we're already seeing a significant increase in vulnerabilities, attacks and data loss." Social-Media Threats Social-media threats are nothing new, but expect to see more of them next year. McAfee Labs expects social-media services that use URL shortening will be under attack because its easier for cybercriminals to mask the full URL and direct users to m...
Cyprus police said, Turk hackers avenge basketball riot !

Cyprus police said, Turk hackers avenge basketball riot !

Dec 29, 2010
Turkish computer hackers targeted around 20 websites in Cyprus over the weekend in retaliation for an attack on a Turkish basketball team by Greek Cypriot fans, a police spokesman said on Monday. " Acting on information from the office for combating cyber-crime, it was observed that around 20 company websites hosted within the Cyprus Republic were illegally accessed by Turkish hackers, " said Michalis Katsounotos. On some website homepages, the hackers inserted the emblem of basketball team Pinar Karsiyaka, the crescent moon of the Turkish flag, or the words " No Terrorism in Sport. " A FIBA basketball cup match on December 21 between hosts APOEL Nicosia and Turkey's Pinar Karsiyaka ended in violence as 500 rock-throwing local fans clashed with police who prevented them from confronting the Karsiyaka players. Tear gas was used to restore order, while police cars ferrying reinforcements to the sports stadium were pelted with stones. Five officers received ho...
Expert Insights Articles Videos
Cybersecurity Resources