-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Devansh Kumar Jain Found Xss venerability in 4 Websites !

Devansh Kumar Jain Found Xss venerability in 4 Websites !

Jan 20, 2011
Devansh Kumar Jain Found Xss venerability in 4 Websites !  Devansh Kumar Jain is a 14 years old Hacker From Agra, India . He found some Xss venerable sites,as listed below : 1.)   http://sdb.drshnaps.com/search.php?q= <script>alert(String.fromCharCode(68,69,86))</script> 2.)   http://www.newdimensions.org/search.php?q= <script>alert(String.fromCharCode(68,69,86))</script> 3.)   http://classifieds.successcds.net/search.php?q= <h1><b><i>hi</i></b></h1> 4.)   http://pcstats.shoplinc.com/search.php?q= <script>alert(String.fromCharCode(68,69,86))</script> News Source : Devansh Kumar | Via Message
All backtrack tools & menu install in your Ubuntu !

All backtrack tools & menu install in your Ubuntu !

Jan 19, 2011
All backtrack tools & menu install in your Ubuntu ! Download : Click Here Download :  Click Here
Tips for Make Mobile Banking Safe And Secure !

Tips for Make Mobile Banking Safe And Secure !

Jan 19, 2011
As we all know that wireless applications have numbers of vulnerabilities higher then the wired applications and the devices. In India there are not lots of people who do banking through mobile but outside India there are high profile countries in which many people do banking through mobile only.So the assurance of the security is needed for them. Here are some recommandation that the bank and the financial institutions which to be noted and to be implemented in their system. - Implement 2 way and 2 factor authentication which goes with the traditional username and the password.If username and password are compromised, the attacker still needs the second factor to gain access to an account. - Implement high transaction monitoring and also fraud detection system.If hacker passes the 1st factor of authentication or the front door,he is being started tracking by tracking system.The system have to generate logs of the activity of the account and the transaction. -Avoid storing...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
In.com database hacked , SQL vulnerabilities Found By Sec Indi !

In.com database hacked , SQL vulnerabilities Found By Sec Indi !

Jan 19, 2011
In.com  database hacked , SQL vulnerabilities Found By Sec Indi ! IN.com has found many SQL vulnerabilities, vulnerabilities found by  Sec Indi (Indian hacker) . We have already  inform the webmasters to patch those  vulnerabilities as soon as possible. Well here blow as proof we are just showing the Table and Columns from database.  News Source :  Sec Indi | Via Email 
Hackers hack into University of Sydney !!

Hackers hack into University of Sydney !!

Jan 19, 2011
A hacker has targeted the University of Sydney in order to show administrators their faulty security practices, but the matter has triggered an investigation. An internal email sent by vice-chancellor Michael Spence says the university has already hired “two of Australia’s leading web security organisations”. “Each day, the university’s IT networks experience numerous attempted security breaches, which are blocked by our security systems,” he said. “Unfortunately, last week a malicious hacker managed to bypass these mechanisms and accessed the university’s home page and some high level corporate web pages.” He also wrote the website was still intact, and that no private information such as financial details had been released. However, it is understood the hacker defaced the website of the university. Spence also wrote in the email the university is aware of the possibility of more attacks occurring. News Source : Google
Tech2spider found SQLi Vulnerability in University of Michigan - Department of Human Genetics Website !

Tech2spider found SQLi Vulnerability in University of Michigan - Department of Human Genetics Website !

Jan 19, 2011
Tech2spider ( Krunal)   found SQLi Vulnerability in University of Michigan - Department of Human Genetics Website ! News Source :  Krunal aka (tech2spider) | Via Email
Julian Assange's hacking offences revealed in Australian court documents !!

Julian Assange's hacking offences revealed in Australian court documents !!

Jan 19, 2011
IN 1991, using just a "simple, basic computer" from his home in suburban Melbourne, a young Julian Assange created a program that allowed him to access about 11,000 computers belonging to the giant Canadian telecommunications company Northern Telecom. New details of the WikiLeaks founder's early computer hacking-related offences have emerged in court documents released toThe Australian under an application to the Victorian County Court. The documents include a transcript of Mr Assange's 1996 pre-sentencing hearing for 24 computer-related offences, including accessing a server of Northern Telecom. While offering an insight into his unstable childhood, the documents also show the controversial website creator already displayed remarkable computer skills in his early adult life. In its submissions to County Court sentencing Judge Leslie Ross in December 1996, the prosecution described Mr Assange, then 25, as a far more sophisticated hacker than two other men char...
Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t...
OECD said Cyber attacks could create 'perfect strom' !!

OECD said Cyber attacks could create 'perfect strom' !!

Jan 19, 2011
Attacks on computer systems now have the potential to cause global catastrophe, but only in combination with another disaster, the Organisation for Economic Cooperation and Development (OECD) said in a report on Monday. The study, part of a wider OECD project examining possible "Future Global Shocks" such as a failure of the world's financial system or a large-scale pandemic, said there were very few single "cyber events" that could cause a global shock. Examples were a successful attack on one of the technical protocols on which the Internet depends, or a large solar flare that wiped out key communications components such as satellites. But it said a combination of events such as coordinated cyber attacks, or a cyber incident occurring during another form of disaster, should be a serious concern for policy makers. "In that eventuality, 'perfect storm' conditions could exist," said the report, written by Professor Peter Sommer of the London Sch...
FBI to press criminal charges over AT&T iPad user data hack !

FBI to press criminal charges over AT&T iPad user data hack !

Jan 18, 2011
Remember last summer when iPad users on the AT&T network in the US were subject to a hack that allegedly saw around 120,000 customers personal details compromised? The FBI certainly remembers and today it is set to reveal details criminal charges relating to the case, according to Reuters. As we reported at the time, hackers seemingly obtained access to the database of 3G iPad owners and their email addresses. The data was obtained by executing a brute force attack on the AT&T website. AT&T offered a convenient way of letting users log into their 3G data plan accounts, auto-populating users email address on the dashboard by referencing the unique identifier (ICC-ID) of the users iPad. AT&T allowed log into their 3G data plan accounts, auto-populating their email addresses on the dashboard by referencing the unique identifier (ICC-ID) of their iPad. It appeared at the time that the hackers produced a script that auto-generated thousands of unique ICC-IDs, harvesting...
11 Websites hacked by team Jmc H4x0rs !

11 Websites hacked by team Jmc H4x0rs !

Jan 18, 2011
11 Websites hacked by team Jmc H4x0rs ! Hacked Sites : http://tronix.se/ oscommerce2st/catalog/images/ jmcc.html http://www.colecionismo.com. br/loja/images/jmcc.html http://danawa.jp/images/jmcc. html http://www.solarinformatica. com.ar/catalog/images/jmcc. html http://www.boutiquespk.ca/ images/jmcc.html http://www.matech.pl/sklep/ images/jmcc.html http://www.steinkartei.de/ images/jmcc.html http://toy.lt/images/jmcc.html http://www.hiphopdt.de/shop2/ images/jmcc.html http://www.eshoping.lt/ hobbystore/images/jmcc.html http://shop.aplusmoto.ch/ catalog/images/jmcc.html News Source : Jmc H4x0rs | Via Email 
Hacking kits making Cyber Crime Easy !

Hacking kits making Cyber Crime Easy !

Jan 18, 2011
The incidence of cybercrime is set to increase with the proliferation of pre-made hacking software able to be used by less sophisticated criminals, research suggests. IT security software maker Symantec said attack toolkits are becoming more accessible and easier to use, allowing criminals with little technical expertise to turn to cybercrime. The kits can facilitate widespread attacks on computer networks, enabling the launch of pre-written threats, but with certain customised characteristics. Advertisement: Story continues below "In the past, hackers had to create their own threats from scratch," Symantec Australia and New Zealand managing director Craig Scroggie said. This limited the number of hackers, but toolkits are now enabling more people to be involved in cybercrime. A cybercriminal ring was busted late last year over the theft of over $70 million from online banking and trading accounts, allegedly using a kit known as Zeus, Symantec said. "The simplicity, acc...
Expert Insights Articles Videos
Cybersecurity Resources