-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Phone Creeper v0.98 latest version download !

Phone Creeper v0.98 latest version download !

Jan 18, 2011
“ Phone Creeper is a phone espionage suite It can be silently installed by just inserting an sd card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controled by sms text messages. All commands will be silently received and deleted immediately and results will be issued back to sender.  Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default, this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device . ” This is the change log: GETPOS command for GPS location now just grab and sends on demand to minimize battery & CPU usage Block list will now also block SMS messages from users in list also, not just calls. Emergency contact and SIM detection features fixed up. GPS google map...
Maltego v3.0.3 - Latest version Download !

Maltego v3.0.3 - Latest version Download !

Jan 18, 2011
“Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure. Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format” This release offers a fantastic amount of stability and most importantly speed to Maltego. This release also has an updated user guide! Download Maltego v3.0.3  here
Best 5 Cookie Managers tools download !

Best 5 Cookie Managers tools download !

Jan 18, 2011
Free the Top 5 Cookie Managers are , We hope iif you have any other free better known Cookie Managers help us contribute to the list. 1) Cookienator 2.5.32 Cookienator is a tool that will help you remain anonymous from search engines such as Google and other notorious web-usage trackers such as Doubleclick or Omniture. Many websites install cookies in your browser, and these little bits of tracking data will be used to identify you for as long as you keep using your computer. In the past few years I have been alternating between religiously clearing my cookies from time to time, or neglecting to do so with hope that these corporations will live up to their vague promises of doing no evil. Then I decided that it’d be more productive to automate the whole thing, so I spent a good chunk of a weekend creating the first version of Cookienator, a simple program that will leave most of your cookies alone but will remove the ones that put your privacy at risk. It lets users delete evi...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

Jan 18, 2011
aidSQL is a PHP application provided for detecting security holes in your websites. It is a modular application, meaning that you can develop your very own plugins for SQL injection detection & exploitation. Sample usage of aidsql: ./aidSQL --url=www.sample123.com We find it similar to nikto, whatweb and others. One good feature is that we can get a reverse basic shell once exploited. It also has a simple shell script which will run aidSQL and do some checking for PHP. You can also Google through this application and look up for sites. It also includes a primitive crawler. Download aidsql (aidsql-devel-01102011.tgz) here News Source : Google
Rapper Lil Wayne's Twitter account hacked !!

Rapper Lil Wayne's Twitter account hacked !!

Jan 18, 2011
Rapper Lil Wayne has become the latest victim of web hackers when his Twitter account was compromised by an internet prankster. The 28-year-old hip hop star has suspended his Twitter account after the hacker sent a number of objectionable messages to his fans and followers, reported Contactmusic. The 'Lollipop' hitmaker's page was illegally accessed on January 16 and rude messages were sent to his celebrity pals which included 50 Cent, Soulja Boy and The Game. The hacker also posted explicit jibes about the rapper's recent spell in prison on weapons possession charges. One of the post sent to Soulja Boy reads, "I sent a donations (sic) to your Paypal, check it, I heard you got 13,000 (record) sales lil homie, I feel bad for you!" Wayne's page was also hacked last year where the prankster posted fake news of the rapper performing with Nicki Minaj. His account has now been taken offline. News Source : Times of India
Man Tunnels Into GameStop & Steals Games !

Man Tunnels Into GameStop & Steals Games !

Jan 18, 2011
Here In the title i have mentioned that "Man Tunnels" It means that he literally tunneled into the system. Game Piracy is the business all over the world.But there are some guys who don't need to do piracy.They are digging into the system of the local game shop sites and making stocks as much as then can in no time. This man has stolen games like Greeneville & Tennesse , After that he got arrested in last week for being tunneling into the local game shop.Steven Archer, 33, making off with almost $300 in cash and around $5,400 in games. But truth always wins.He could not enjoy his his gotten gains ( The games which are stolen By this man )and he got arrested last week.The man was arrested by Detective Pat Hankins.He was being charged with felony burglary. So the conclusion is that the people who don't want to spent money to buy games,they should wait to come the money in their hand and then to buy original game cd/dvd rather to digging into the system and g...
Hackers will not be deterred by UK cyber defences !

Hackers will not be deterred by UK cyber defences !

Jan 18, 2011
Military "cyber weaponry" will become commonplace this century, but it will be unlikely to deter attacks by "hacktivists" and criminal gangs, and could easily be used for state-sponsored cyber attacks instead, the Organisation for Economic Co-operation and Development warns. The British authors of the study, which is released today, also caution that "lurid language" and lobbying by technology firms distort the government's plans to protect Britain against cyber attacks. Professor Peter Sommer of the LSE and Dr Ian Brown of Oxford University's internet institute were commissioned by the OECD for one of a series of investigations into potential "future global shocks". Their report comes at a time of heightened awareness of online attacks following hacking protests against companies caught up in the WikiLeaks controversy. In response to other hacking attacks from groups inside China and Russia, military preparations have begun to ga...
Four years on, phone-hacking scandal is still growing !

Four years on, phone-hacking scandal is still growing !

Jan 18, 2011
Four years after the phone-hacking scandal at the News of the World saw the newspaper's former royal correspondent, Clive Goodman, jailed, the story refuses to die. Each week another celebrity launches a legal action against the paper, generating a fresh batch of damaging allegations that Rupert Murdoch's media empire could do without. The Observer has established that at least six people have issued proceedings against the paper, with potentially scores more in the pipeline. The problems for the tabloid, however, are not confined to these cases. Eleven people are taking separate legal action against Glenn Mulcaire, the private investigator at the heart of the scandal, who is appealing against a decision to make him divulge which journalists on the paper paid him to hack phones. Until this case is resolved – the court of appeal is expected to hand down a judgment in May – many outstanding issues cannot be addressed. "It's vital that the court of appeal acts to br...
Car thieves can easily hack remote keyless systems !

Car thieves can easily hack remote keyless systems !

Jan 18, 2011
Those remote key fobs nearly all automakers offer -- turns out they're fairly easy to hack so the bad guys can unlock your car and high-tail it before you even finish your shopping. Your only advantage: If your car has a remote that still requires a key, the bad guys can't start it easily, even though they can open the doors and trunk and get inside. Cars that have keyless entry and the push-button ignition switches becoming more common are in the most jeopardy. The thieves can, in fact, start those vehicles because the same purloined signal that opens the doors also tells the push-button system it's OK to start the car when somebody pushes the button. The setup for hacking is easy, but not simple. It requires a couple of special antenna and a certain proximity to the victim, the Swiss researchers found. The research company, ETH Zürich, hacked into eight automakers' remote-entry systems. No coding system could stop it, the researchers said.
Kinect hackers take control of the action !

Kinect hackers take control of the action !

Jan 18, 2011
Christopher Baker spent Boxing Day as a VJ – video jockey – for a warehouse party in Liverpool. Among the items being used was a Microsoft Kinect controller, normally used to play Xbox 360 games such as Kinectimals or Kinect Sports. But Baker wasn't playing games: the system was rigged up to a computer running software to interpret the movement data being gathered by the system. The software Baker had written monitored how the clubbers were moving and used that to affect the sound, creating a feedback loop between dancers and sound. "It was popular with the clubbers because they could interact directly with the sound and were immersed in the experience," he says. Baker, who works at Apposing, a mobile app development company based in Liverpool, is one among hundreds of people who have embraced the Kinect not for its potential in gaming (though that is substantial), but because, unusually for an Xbox accessory, its outputs can be put to different – and in some cases revo...
UK premier supplier of iPhone and iPod touch accessories website Got Hacked by KillerMind HaXor !

UK premier supplier of iPhone and iPod touch accessories website Got Hacked by KillerMind HaXor !

Jan 17, 2011
UK premier supplier of iPhone and iPod touch accessories website Got Hacked by KillerMind HaXor !  Link :  http://www.iphonebits.co.uk/ Mirrors :  http://www.zone-h.org/mirror/id/12911520 http://mirror-az.com/mirror/?id=9382 News Source :  KillerMind HaXor
Amitabh Bacchan's fan website hacked by 'Cyber Stonepelters Force' !

Amitabh Bacchan's fan website hacked by 'Cyber Stonepelters Force' !

Jan 15, 2011
A group of hackers, claiming to be from Kashmir, on Thursday night hacked a website dedicated to the Bollywood superstar, Amitabh Bacchan. The group calling itself ‘Cyber Stone Pelters Force or Cyber Sangbaaz Force’ hacked www. amitabhbachchanonline.com last night and posted pro-independence, anti-India, anti-Israel and anti-United States content on the home page. The hackers have also uploaded a song of Roushan Illahi, popularly known as MC Kash, a Kashmir youth who created ripples on social networking sites Facebook and Twitter with his track "I protest ", which deals with the death of over 113 people, mainly teenagers in government forces’ action during pro-freedom demonstrations last summer. “Hello Mr admin, you got owned by Cyber Sangbaaz Force, Cyber Stone pelters Force from Indian Occupied Kashmir,” reads the introductory message on the website. Slogans like “Down with America,” “Down with Israel,” “Down with India,” “Free Palestine,” “Free Kashmir,” “Go India Go ...
Expert Insights Articles Videos
Cybersecurity Resources