-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Kerala Computer Emergency Response Team launches operations !

Kerala Computer Emergency Response Team launches operations !

Jan 06, 2011
The Kerala Government has announced the launch of the Computer Emergency Response Team, Kerala ( CERT-K ) as the nodal agency for monitoring various cyber security related incidents in the State. Chief Minister Shri V S Achuthanandan formally announced the launch of operations today. The agency will function under the Department of Information Technology, Government of Kerala. It was in April 2010 that the Government set up CERT-K in line with the Indian CERT ( CERT-In ), the national nodal agency, to develop expertise in Government and Government Agencies in Kerala for handling cyber attacks and for preparing adequate sectoral contingency plans for handling crisis that may happen due to cyber attack or cyber terrorism. CERT-K will be the state Computer Emergency Response Team for Kerala, operating on behalf and in conjunction with CERT-In. CERT-K will coordinate security efforts and incident response for IT security problems as well as emerging telecom security problems on a stat...
Report : Attacks on social media to rise in 2011 !

Report : Attacks on social media to rise in 2011 !

Jan 06, 2011
ESET, a security solution provider for viruses and malicious software, has released its cyber-threat report for 2011, predicting that attacks on Facebook and other social networks will increase over the coming year. The report prepared by specialists and searchers in the business also says the mentioned attacks' main purpose will be to steal data, also known as 'phishing' Attacks on Facebook and other social networks are likely to increase over the coming year, according to a report from ESET, an IT security company, on possible threat trends for 2011. Social media will be a focus for social engineering attacks such as those already commonly experienced by users of Facebook and Google, according to ESET’s new San Diego-based Cyber Threat Analysis Center, or CTAC. Furthermore, it is likely there will be an increasing volume of attacks on other social networking sites such as LinkedIn, Orkut and Twitter, as well as other search engines such as Bing and Yahoo, the research...
Kerala cyber police closing in on software theft culprits !

Kerala cyber police closing in on software theft culprits !

Jan 06, 2011
Thiruvananthapuram, Jan 5 (IANS) The cyber wing of the Kerala Police Wednesday claimed it had got vital clues about the theft of software source codes and intellectual property data from a Kochi-based IT company. The investigation is progressing on the right track, V.K. Ajith Mohan of the police cyber wing who heads the probe, told IANS. The probe was launched November 2010 following a complaint filed by Stephen Antony, chief executive director of Rabboni Convergence Technologies Research and Development Private Limited. Antony claimed in his petition to Director General of Police Jacob Punnoose that two of his employees colluded with a person from Mumbai - Dominic Thomas - to steal the company's source code, algorithms and the software architecture and passed it on to a US-based IT firm. 'We have questioned four people, including two company employees, besides Dominic Thomas and also Anto George, a software professional from Bangalore, Mohan said Wednesday. The cyber ...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
Hacker Bid : Indianhaxors.com Domain for Sale !

Hacker Bid : Indianhaxors.com Domain for Sale !

Jan 05, 2011
Hacker Bid : Indianhaxors.com Domain for Sale ! Hello Hackers,                        One of mine friend having a very popular keyword and impressive Domain name - www.indianhaxors.com . He has no time to manage the site, so finally he decide to sell this domain + lots of other Promotional Offers. Domain Offer : 1.) Full Domain panel + dns managment of Indianhaxors.com 2.) A blog with highly customized premium theme with Feedburner+twitter+facebook integrated. 3.) Onsite SEO will be done. 4.) Domain Subscription For 1 Year. 5.) Facebook Group with 1000+ members (Hackers of all countries) 6.) Facebook Community with 150+ members. 7.) Domain Submittion to 5000 directories and websites. 8.) Google Sitemap submitted. Minimum Bid : $50 Last Date for Bid : 31 January,2011 Highest Bid Yet : $50 | By : THN The Highest Bid Will be Updated Here,Every Morning in above post. So stay tuned to this page, If ...
Police probe hacker attack on Brazil president's site !

Police probe hacker attack on Brazil president's site !

Jan 05, 2011
RIO DE JANEIRO (AFP) – Federal police are investigating an apparent hacker attack on the website of Brazil's president, just a day after President Dilma Rousseff took office, officials told local media Tuesday. The attack on Sunday was being investigated by the Federal Data Processing Service (Serpro), according to official sources cited by G1 news and Agencia Folha. " The federal police will investigate anyone responsible for attempts to block the security of the president's office, " Serpro's spokesman Carlos Marcos Torres told G1. A group calling itself the "Fatal Error Crew" took credit for the apparent attack in a Twitter posting. Serpro said there was an intentional flood of attempts to access presidencia.gov and brasil.gov, which knocked the sites out of service for a few hours. In April, the ruling Workers Party had its website knocked out by a hacker for 24 hours.
Four arrested in 1st cyber fraud in J&K !

Four arrested in 1st cyber fraud in J&K !

Jan 05, 2011
Srinagar: A Nigerian national is under the scanner of Jammu and Kashmir Police while four other persons have been arrested in the first case of cyber bank fraud in the Kashmir Valley. Four persons, including two residents of Mumbai, were arrested last week in connection with a case of bank fraud caused by cyber hacking, in which Rs 3.25 lakh were swindled from three accounts in Kashmir. "It is the first case of its kind in the Valley. The first cyber related bank fraud case carried out in Kashmir by using tampered credit cards which are cloned and linked," said Senior Superintendent of Police (SSP), Srinagar, Ashiq Bukhari. The case could lead to a breakthrough in busting a "huge nexus involved in bank frauds across the country or may be outside the country," he said. On December 30, police received a complaint from a local jeweller that a "fraudulent" digital transaction worth Rs 1.35 lakh had been made from his shop. "Investigation revealed that a l...
Irfan Shakeel has found xss vulnerability in EESL and Harvard University's Website !

Irfan Shakeel has found xss vulnerability in EESL and Harvard University's Website !

Jan 05, 2011
Irfan Shakeel has found xss vulnerability in EESL and Harvard University's Website ! Who is Irfan Shakeel ? Well , Irfan Shakeel ,is a telecommunication engineer from Pakistan, He is a White hat Hacker. He is working as a security researcher for a while. His blog at http://www.ehacking.net/  .The main objective of his blogging is create the security awareness among user's. 1.) Harvard University's Website -  http://news.harvard.edu 2.) EESL - Energy Efficiency Services Limited -  http://www.eesl.co.in
Unkn0wnV1rus said - Indian Reserve Bank is Venerable and easy to hack !

Unkn0wnV1rus said - Indian Reserve Bank is Venerable and easy to hack !

Jan 05, 2011
Unkn0wnV1rus said - Indian Reserve Bank is Venerable and easy to hack ! Hello Friends, Last night I got a email from " Unkn0wnV1rus " . He/she submit us a news about " Venerability of Indian Reserve Bank's website " . He claim that he have access to server . Purpose of publishing this news is just to inform Indian Govt. that still India's 99% important sites/servers are venerable. Website Link : brbnmpl.co.in
Common Admission Test (CAT) Site Hacked and this buzz makes IIMs website go offline !

Common Admission Test (CAT) Site Hacked and this buzz makes IIMs website go offline !

Jan 05, 2011
The Indian Institutes of Management on Monday dismantled the web portal of their Common Admission Test (CAT) amid fears that some students managed to access their results in the 2010 CAT through the website ten days before schedule. The IIMs dismissed speculation that the CAT website “ www.catiim.in ” had been hacked, but admitted late tonight that they had made the portal dysfunctional to prevent any chance of students accessing results ahead of schedule. The results are scheduled to be released on January 12. “Our website has not been hacked. We have voluntarily made the website dysfunctional,” 2010 CAT convenor and IIM Lucknow professor Himanshu Rai told HT. But Rai conceded that some students could have accessed results over a brief period between last night and today morning. “We yesterday started the process of testing out the process of uploading results. If during the period we were testing, someone put in their details, they may have accessed some result details,” Rai a...
'Anonymous' Hacktivists Attack African Government Sites !

'Anonymous' Hacktivists Attack African Government Sites !

Jan 05, 2011
" Anonymous ," the shadowy hacktivist group that's attacked PayPal, the record industry and the Church of Scientology, has upped the ante: It's now taking on entire countries. The group launched massive distributed denial-of-service (DDoS) attacks on at least eight Tunisian government websites beginning Sunday night, according to Al Jazeera and the Internet security company Sophos. As of 4 p.m. EST Monday, the official Tunisian government website, www.tunisia.gov.tn , was still offline. Last Thursday, Anonymous launched similar attacks against websites operated by the government of Zimbabwe. Both attacks are part of " Operation Payback ," Anonymous' long-running campaign against organizations it feels are threatening Internet freedoms. Tunisia and Zimbabwe had blocked their citizens' access to Wikileaks last month, after secret U.S. State Department cables unflattering to either country were revealed as part of Julian Assange's huge dip...
Cyber criminals to be more aggressive in 2011 !

Cyber criminals to be more aggressive in 2011 !

Jan 05, 2011
New Delhi:   With the growing diversity of operating systems among companies, and the increasing use of mobile devices, cyber criminals will put a new spin on social engineering by 'malware campaign' under which they will bombard recipients with email that drop virus downloaders.       According to an internet security software and service provider Trend Micro study on Threat Predictions for 2011, threat researchers have found that more than 80 per cent of the top malware use the web to arrive on users' systems and every second, 3.5 new threats are released by cyber criminals.       During current year, proof of concept attacks against cloud infrastructure and virtualised systems will emerge. Diversity of operating systems at the endpoints forces the cyber criminals to focus more on critical cloud services and server infrastructures. Further, the report noted that mid-sized companies will be targeted in cyber espionage. The growth ...
Cybersecurity Experts Create Program That Steals Text Messages !

Cybersecurity Experts Create Program That Steals Text Messages !

Jan 05, 2011
Two cybersecurity researchers have just taught smartphones a lesson by developing a program that can eavesdrop and steal text messages from any phone on a GSM network – all in about 20 seconds. The Guardian reported that Karsten Nohl and Sylvain Munaut spent a year honing their technology, which starts by sending a text message to a target phone; called a “ghost” message, the text doesn’t show up on the recipient’s phone, but enables the hackers to obtain the handset’s unique identification number. Once that identification number is stolen, Nohl and Munaut were able to record phone conversations and texts from the hijacked phone. Their proof-of-concept hack can be deployed on any phone running on a GSM (Global System for Mobile Communications) network. That’s a pretty big focus group – about 80 percent of the world’s phones run on a GSM network. “Any GSM call is fair game,” Nohl told the BBC. He and his partner in cybercrime demonstrated their data-grabbing technology at last w...
Expert Insights Articles Videos
Cybersecurity Resources