#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

US recruiting young cyber warriors !

US recruiting young cyber warriors !

Feb 02, 2011
The United States is attractive for the abutting bearing of cyber warriors. The US Cyber Challenge Cyber Foundations competition, kicked off this anniversary by the nonprofit Centermost for Internet Aegis , is out to acquisition 10,000 acceptance with the abeyant to become "top accoutrements in cybersecurity." "The charge to acquisition artistic solutions to attention our advice systems and agenda basement has never been greater," said centermost arch controlling William Pelgrin. "The Cyber Foundations antagonism will advice us tap into the amazing aptitude beyond our nation's schools to analyze those with a affection for aegis and a admiration to put their abilities to acceptable use," he continued. The antagonism consists of a alternation of timed quizzes to analysis aerial academy acceptance in computer science categories advised key to attention networks and systems. Top-scoring acceptance will get status, prizes, and introductions to gov...
British antic Matt Lucas Twitter Hacked !

British antic Matt Lucas Twitter Hacked !

Feb 01, 2011
British antic MATT LUCAS has hit aback at accusations he has been autograph letters on Twitter.com while drunk, insisting his annual was afraid this anniversary (beg31Jan11). The Alice In Wonderland star's folio was adapted with several camp posts on Monday night (31Jan10), abrogation admirers assertive he had advantaged in booze afore hitting the web. The teetotal antic woke up on Tuesday (01Feb11) to acquisition a cord of replies from afraid followers and he appear an actor had taken ascendancy of his account. He writes, "Good morning all. Um, my Twitter annual was afraid aftermost night, so avoid any Tweets beatific because they didn't appear from me! "Thanks for your accusations that I was drunk. I'm teetotal. The aberration I fabricated was not logging out of my computer!"
FBI raids on 40 Anonymous hackers !

FBI raids on 40 Anonymous hackers !

Feb 01, 2011
The FBI would have conducted 40 raids yesterday and seized the computers of members of the loosely organized group of hackers known as Anonymous. Several members have posted their stories in online forums, including images of kicking in doors. The FBI has seized every computer in every house and other electronic devices such as game consoles and iPhones. The reports may be exaggerated, but the FBI has issued 40 orders in the case. The FBI was gathering evidence on the group's refusal of service attacks against Visa, MasterCard, PayPal and Amazon. The group has launched attacks in retaliation for actions against Wikileaks site, which has published thousands of documents from the United States filed in December. Denial of service attacks are frustrating for victims and may also cause real economic damage. They are also against the law and raids. But Anonyme allegedly political reasons in the raid. The group said in a press statement that the denial of service attacks have bee...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
Poll Results : Prefer way b/w Whitehats & Blackhats ?

Poll Results : Prefer way b/w Whitehats & Blackhats ?

Feb 01, 2011
Poll Results :  Question : With whom/as whom you will Prefer to work ? a) Registered WhiteHat Hackers b) Unregistered BlackHat Hackers We have Total 457 Votes in 15 Days on our Sites. Finally today the result is out, and  Registered WhiteHat Hackers won by 72% Votes (331 Votes) , where  Unregistered BlackHat Hackers got 27% Votes (126 Votes) In last 15 days of open Voting. Thank you friends for voting and participating in this event of " The Hacker News " :D
AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

AVG and Netlog Partner to Help More Than 24 Million Social Networking Users Stay Safe !

Feb 01, 2011
AVG Technologies, developers of the world's best accepted chargeless anti-virus software, appear today that it has teamed up with Netlog to barrage a co-branded Aegis Center aural the accepted European amusing arrangement now accessible at https://www.netlog.com/go/helpdesk/security/. The Aegis Center powered by AVG, will acquaint and brainwash users about Internet security, accommodate tips and advice users assure themselves from malware, spyware and added attacks by cybercriminals while they cream online. Additionally, all links aural Netlog will be automatically scanned by AVG LinkScanner, admonishing users to burden from aperture a articulation back a blackmail is detected. With added than 72 actor associates and over 150 actor visitors per month, Netlog is one of the fastest-growing and best accepted amusing networking sites amidst European adolescence amid the ages of 18 and 25. The Aegis Center will be initially formed out to 24 actor Netlog users in the top six countries of...
SourceForge Detects Targeted Attack, Resets Millions of Passwords !

SourceForge Detects Targeted Attack, Resets Millions of Passwords !

Feb 01, 2011
Last week, accessible antecedent computer application development and administration ability SourceForge the ambition of a directed attack. Once the advance was detected, the aggregation bound bottom ward the impacted hosts to abate the accident of accretion to added hosts. Thus, this prevented accessible abstracts acquisition activities, said SourceForge. was Consequently, it resulted in annual blow for CVS Hosting, ViewVC, Fresh Release upload capability, and ProjectWeb/shell. According to SourceForge, the aggregation assay baldheaded (among added things) a afraid SSH daemon, which was adapted to do countersign capture. Even admitting the aggregation has no affirmation to advance that the sniffing advance was acknowledged in accession passwords, it is demography a basic admeasurement of abandoning all SourceForge user annual passwords. "What we absolutely don't appetite is to acquisition out in two months that passwords were compromised and we didn't booty any action," as per t...
New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

New PlayStation 3 Firmware Hacked Within 24 Hours of its Release !

Feb 01, 2011
Sony's been arena cat-and-mouse with PS3 firmware crackers, and beneath than a day afterwards its adaptation 3.56 firmware was released, hackers accept baffled Sony's locks. If you've gotten acclimated to accepting custom firmware on your Sony PlayStation 3, the association over at KaKaRoToKS, accepted for custom PS3 firmware, accept absurd the most recent firmware (version 3.56) appear by Sony in beneath than 24 hours afterwards the update's release. While Sony's been attempting to abolish any fresh versions of custom 3.56 firmware via DMCA appraisal notices from Github, you can still get a authority of the most recent custom firmware (failOverFlow) done up by KaKaRoToKS over at Gitorious. The advantage abaft custom firmwares (some custom firmwares don't acquiesce you to charlatan games) is that they acquiesce you to install your own amalgamation files like the ones from Sony's PSN.
B.C. dating website hacked !

B.C. dating website hacked !

Feb 01, 2011
A hacker bankrupt into the online dating website Plenty of Fish aftermost week, auspiciously exporting hundreds of accounts. Markus Frind, CEO of the Vancouver-based company, said Monday all passwords accept been displace back the Jan. 18 aegis breach. He additionally said all annual users accept been contacted. However, in a blog column Monday, he accustomed 345 accounts were auspiciously exported. Steffani Cameron has had an annual with Plenty of Fish for four years. She affairs to annul her annual because she doesn't assurance the company's aegis measures. "When I was accepting my account chump affliction email, they were saying, 'You've got added matches and actuality is your password.' Anybody who sends passwords unencrypted in apparent argument in an email has some austere issues with compassionate what aegis absolutely means," she said. Approximately 28 actor bodies accept logged assimilate the Plenty of Fish website back its inception. I...
WikiLeaks 'hacktivists' acknowledge war on the UK !

WikiLeaks 'hacktivists' acknowledge war on the UK !

Feb 01, 2011
Anonymous, the "hacktivist" aggregate abaft a alternation of pro-WikiLeaks cyber attacks, has declared war on the British Government afterward the arrest of bristles of its associates in the UK. In a account acquaint online, the organisation apprenticed supporters to hit Government websites with broadcast abnegation of account (DDoS) attacks – a way of calamity a ambition website with so abounding requests for advice that it is affected to shut down. The tactic has been acclimated by Anonymous activists with arresting success in the accomplished two months to briefly attenuate the websites of banking institutions or governments which accept criticised WikiLeaks in the deathwatch of the advertisement of bags of abstruse US admiral cables. The alarm to accoutrements raises the bogey of co-ordinated cyber attacks on Government online infrastructure. It has been advised austere abundant for GovCertUK, the advice aegis agency, to acquaint government websites to booty precaut...
Union leader Crow claims phone was hacked !

Union leader Crow claims phone was hacked !

Feb 01, 2011
Firebrand abutment baton Bob Crow on Monday became the best recent accessible amount to accuse to the badge that his buzz has been afraid by journalists. Lawyers for Bob Crow, general-secretary of the Rail, Maritime and Carriage Workers' union, accept accounting to London's Metropolitan Badge allurement them to delving suspicions that his buzz ability accept been targeted as continued ago as 2000. "RMT has had suspicions that journalists may accept had admission to clandestine advice about my movements and my union?s activities that date aback to the year 2000," Crow said. "We are now allurement for the police, as allotment of their renewed investigation, to acknowledge to us any affirmation or advice that they may accept baldheaded in account of the Account of the World." Police launched a beginning analysis into buzz hacking by journalists at the Rupert Murdoch-owned Account of the World Sunday abridged aftermost anniversary afterwards accepting ...
Kaspersky’s security suite source code leaked, available for download !!

Kaspersky's security suite source code leaked, available for download !!

Jan 31, 2011
As a result of leakage of public access were sources of products from Kaspersky Lab.   And the company and to read the archive of the experts claim that it contained "a fragment of an older version of the antivirus engine, which had previously been circulated in closed hacking resources. A free file hosting Mlfat4arab posted the source code of the product Kaspersky Lab »- Kaspersky Internet Security. Rar-archive size of 182 MB of January 26, 2011 uploaded to the hosting user unknown, and at the time of this writing, the file has been downloaded 2071 times.   The archive contains a collection of files with code written in C + + tool in Visual C, and assembly files. Judging by the names of the folders in the archive, it contains the source code of the engine KLAVA, which is a work in Kaspersky Lab's entered the final phase in 2008, based on KLAVA all subsequent generations of the company's products, starting with the line in 2009, which appeared on the market autumn 2008...
Nmap 5.50 latest Version out !

Nmap 5.50 latest Version out !

Jan 31, 2011
"Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a uti...
Expert Insights Articles Videos
Cybersecurity Resources