-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Worm Virus Twitter Scam Push Rogue !

Worm Virus Twitter Scam Push Rogue !

Jan 22, 2011
Thousands of Twitter users are believed to have been struck with malicious links tied to a rogue anti-virus hoax circulating the microblog service. Scam is spreading malicious links goo.gl wrong URL shortening services. According to Kaspersky Lab, malicious links to redirect users to different areas with "m28sx.html page. This is an HTML page directs users to a static domain, the Ukrainian top-level domain. From there, the blog of Senior Research Kaspersky Lab Malware Researcher Scientist Nicolas Brulez, the domain name directs the user's IP address, press the fake antivirus. "Once on this site," Burn blog, "I [a] warning that your machine is running suspicious applications and invite you to explore. ... The user is prompted to remove all threats to your computer and download a fake antivirus application [sic] called "Safety Shield." Del Harvey, Director of Trust and Security on Twitter, tweeted about the day that the company aims to remove the ...
3 Websites hacked by Cyber pr3dat0r (Team StuXnet)

3 Websites hacked by Cyber pr3dat0r (Team StuXnet)

Jan 21, 2011
3 Websites hacked by Cyber pr3dat0r (Team StuXnet) Hacked Links :  http://www.vendstream.com/portals/0/cyber.txt http://www.hqex.net/index.html http://www.pumpsandpressure.com/portals/0/cyber.txt News Source : Cyber pr3dat0r (Team StuXnet) | Via Message
Sri Lanka Army Tender Management System's site Hacked By Pakistan Cyber Warrior !!

Sri Lanka Army Tender Management System's site Hacked By Pakistan Cyber Warrior !!

Jan 21, 2011
Sri Lanka Army Tender Management System 's site Hacked By Pakistan Cyber Warrior !! Site link :  http://tender.army.lk/
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
2 Indian websites Hacked By Team Flawless (Pakistan Hackers) !

2 Indian websites Hacked By Team Flawless (Pakistan Hackers) !

Jan 21, 2011
2 Indian websites Hacked By Team Flawless(Pakistan Hackers) ! Links:: http://ktvchannel.in/TeamFlawless.htm http://www.sixer.in/pictures/vids_api/TeamFlawless814.htm Mirrors: http://zone-h.org/mirror/id/12930377 http://mirror-az.com/mirror/?id=9810 http://mirror-az.com/mirror/?id=9809 News Source : aBu-HurrerA | Via Email
Punjab Education Department E-mail Hacked !!

Punjab Education Department E-mail Hacked !!

Jan 21, 2011
Hoshiarpur : In an incident that has left teachers in schools in Hoshiarpur district of Punjab face red, the official email address of the school board here has been pirated and pornographic material was distributed to 400 public schools in the district. "We are using this e-mail address to send notifications and important information to schools in Hoshiarpur. This is a case of cyber-attack as someone sent pornographic material to all schools after hacking the e-mail, Sukhwinder Kaur, Deputy District Education Director (WD), Hoshiarpur, told IANS. After the accident, the police made an appeal DEO. "It was really embarrassing that the majority of teachers in computer services at the school are women. These things are not tolerable, and we are all shocked by this incident. Upon receipt of this information, he immediately instructed schools not to open emails mails sent from this address, "said Kaur. Sources indicate that the attacker has sent between 15 and 20 em...
Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Jan 21, 2011
What is the future of political protest, as in a highly digitized world? We follow the real-time display via Wikileaks Cablegate. The day of the cables has been convicted for release in major newspapers worldwide, called a "political hack" cut the Wikileaks site with a distributed denial of service (DDoS). Later he wrote about Twitter that he went after the site for "attempting to give life to our troops and other assets." Wikileaks Swedish webhost moved the site owned by Amazon.com and Elastic Computing Cloud (EC2) in Ireland. When Senator Joseph Lieberman contact the hosting site, Amazon, Amazon Wikileaks to stop the service, citing terms of use. Then the free-for-all began. The pirates were involved, this time on behalf of Wikileaks, directed to Amazon. When PayPal froze payments to Wikileaks, the anonymous group of hackers, who organized the attacks on Amazon, focusing on reducing the site to pay online. When MasterCard announced that it would cease opera...
Where To Buy Your Tools From Hackers ?

Where To Buy Your Tools From Hackers ?

Jan 21, 2011
Software that facilitates the attack by beginners online scammers and the future is big business anarchists, says Karlin Lillington The suites are equipped with new software with all the trappings of modern software now offers: cloud computing hosting, software as a service (SaaS) functions, outsourcing, digital certificates, licenses to prevent piracy, software modules, and provided services and support packages. But the difference between these programs - listed in the Internet Relay Chat rooms, instant chat (IRC) and private online forums - and what it could buy public providers is that they offer more software piracy increasingly sophisticated for simple - young hackers with little ability to write their own computer code. "Lessons learned from large companies legitimate software - such as development practices, techniques and anti-piracy, support and prices - are regularly repeated in the informal economy, in order to increase efficiency and profits, says the safety re...
Hackers Steal 100,000 E-mail !

Hackers Steal 100,000 E-mail !

Jan 21, 2011
Two attackers were more than 100,000 e-mail users Apple iPad, including politicians and famous journalists, federal prosecutors said Tuesday notifying the prosecution of men. AT & T has revealed a vulnerability of months ago, and U.S. Attorney Paul Fishman said there was evidence that the two men have used the information obtained for criminal purposes. Authorities warned, however, that information can be dissolved in the hands of spammers and scammers. Daniel Spitler, a guard from the library 26-year-old from San Francisco and Andrew Auernheimer, 25, of Fayetteville, Ark., is accused of fraud and conspiracy to access a computer without authorization. Fishman characterizes men and their cohorts that participation in a "malicious upsmanship, as they sought to impress others and others in the online community. "We do not tolerate crimes committed for street cred," said Fishman. "Hacking is not a competitive sport, and security breaches is not a game....
Hackers Steal 2 Million Tonnes Of Carbon Credits In The EU !

Hackers Steal 2 Million Tonnes Of Carbon Credits In The EU !

Jan 21, 2011
Hackers have stolen two million tons of pollution rights in a raid five days this week in the carbon system of the EU, an EU source said Thursday. The amount of the stolen carbon credits in the online action, as a spokesman for the European Commission said was "maybe unified" represent only a fraction of the global industrial emissions permits gas greenhouse, but it is potentially worth several million euros. The magnitude of the theft, which involved five EU countries without a name, was revealed a day after Brussels has closed all 27 national records sales organization for a week, citing insufficient protection online. Credits just stolen from the Czech Republic amounted to € 7,000,000. Fourteen of the 27 states of the European Union must strengthen its security in line with the minimum standards, the spokesman said. The European Union Emissions Trading Scheme (ETS) is the largest multinational greenhouse gas emissions trading scheme in the world, but suffered re...
Hackers Steal $ 150,000 Malware Job Search !

Hackers Steal $ 150,000 Malware Job Search !

Jan 21, 2011
Small businesses are worried about a new scam: criminals in search of work who want to break into online bank accounts. The U.S. Federal Bureau of Investigation issued a warning Wednesday on a new version of a fraud technique called long-term computer automated information exchange fraud. With ACH fraud criminals to install malware on their computers and small businesses use to access online bank account of the company. They created a fake transfer of funds, adding fake employees or beneficiaries, and move the money offshore. Scammers can move hundreds of thousands of dollars in a few hours with this technique. Often target small businesses that use regional banks or credit unions, which often lack the resources to identify and block fraudulent transfers. This is the last resulted in a scam, criminals are apparently looking for companies that use on-line and then send malicious programs, which seems to have falsified job applications. An unnamed U.S. company recently lost $ ...
CIO said - London Olympics Will Be 'ready' For Cyber-attacks !!

CIO said - London Olympics Will Be 'ready' For Cyber-attacks !!

Jan 21, 2011
London Olympics will be well prepared for attempted cyber attack, according to CIO Gerry Pennell London 2012. Speaking in London to start in 2012, and Atos Origin IT testing organization, Technology Lab, Pennell said the attacks at the Olympics - is also trying to overthrow the Games, to influence the results data and DDoS attacks on the pages of the event - were predictable. The former interior minister David Blunkett has also felt the impact of cyber attacks at the Olympics in 2009. Pennell said: "We have cyber attacks, certainly the previous games have always been attacked, then we will be attacked .. "We work with partners and government to ensure that we have the right of defense." With access to the laboratory of Technology, Atos and London of 2012 was 200 000 to start testing the entire Olympic Games IT infrastructure that is flexible, adaptable to change and secure. For example, scenarios such as computer room fire, or a virus, will be tested in real t...
The World Now, "Third Age" Cyber Crime  !

The World Now, "Third Age" Cyber Crime !

Jan 21, 2011
The year 2010 was a crime of great team and could prove to mark the beginning of a "third age" of computer crimes, security expert Graham Cluley of Sophos, said before the review of the latest threats Company year. The first period was marked by amateur hackers and virus creation on the PC, the second by the merger of organized crime with new Internet technologies, and as expected 2010 has seen a lot on both fronts in ways each increasingly sophisticated and varied. That the points during the year, the criminals seem to be moving some of the old-fashioned junk mail and use their websites to incorporate crime e-mail, Battlefront, social networks. "The scale subversive activities, Facebook seems out of control," said report co-author, Graham Cluley. "Social media sites, however, unable or unwilling to invest the resources necessary to stamp out," he writes, the last line of stinging comments made in recent months is evident satisfaction of security. ...
Expert Insights Articles Videos
Cybersecurity Resources