#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hacker claims credit for shutdown of WBC church's Website !

Hacker claims credit for shutdown of WBC church's Website !

Feb 24, 2011
Twitter post suggests 'The Jester' may have been responsible for knocking controversial church offline A Twitter message from Monday suggests that a seld-proclaimed "hacktivist" using the handle The Jester may have been responsible for knocking the controversial Westboro Baptist Church offline. In the  message , the hacker claimed to have temporarily taken down the public website of the church "for celebrating the death of U.S. troops." The message, however, made no direct mention if The Jester (@th3j35t3r onTwitter) was also responsible for the unavailability today of several other websites affiliated to the WBC. Members of the WBC church, based in Topeka, Kan., are known for their strident anti-gay views and for protests at funerals of slain military personnel and others. Last week, someone purporting to be from the hacking collective known as Anonymous, posted a letter on an Anonymous site, warning WBC members of attacks against their church public webs...
Libyan authorities restrict internet access !

Libyan authorities restrict internet access !

Feb 23, 2011
The Libyan government could pull the plug on the country's internet as protests sweep the country. On Friday and Saturday night the country experienced a near black-out, with continued patchy access this week, according to a  Google Transparency Report . Libya has had periods of partial or total unreachability through the weekend. The first night's internet blackout was repeated 24 hours later, with all prefixes unreachable from 1am to just after 8am Sunday morning, said James Cowie from internet monitoring firm Renesys. "At the moment, however, the Libyan prefixes are reachable, traceroutes inbound are completing at normal rates, and key commercial and government websites that we spot-check are responding normally," James Cowie wrote in a  blog post . Libya's access to the international internet is controlled by a single company, which is run by the state,  Cowie told CNN . That would make it easier, in theory, for the country to shut down internet connections ...
More than 199 Indian govt websites defaced in last 6 months !

More than 199 Indian govt websites defaced in last 6 months !

Feb 23, 2011
The government today said 199 government websites have been defaced by foreign hackers in the last six months.  "The website of Central Bureau of Investigation (CBI) was defaced by a foreign hacker "Pakistan Cyber Army" on December 3, 2010. In addition to this, a total of 198 government websites were defaced by foreign hackers in the past six months," Minister of State for Communications and IT Gurudas Kamat said in a written reply to the Lok Sabha.  He added that several measures have been taken to detect and prevent cyber attacks.  This includes audit of all new government websites and applications and engaging National Informatics Centre (NIC) to improve safety posture etc.  Replying to another query, Kamat said a total of 420 cases were registered under the IT Act 2000 in 2009.  "A total of 217, 288 and 420 cases were registered under IT Act, 2000 during 2007, 2008 and 2009 respectively, thereby showing an increasing trend.  A total of 339, 176 and 276 ...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
#anonsec : Anonymous Hackers guide how to Mesh Network !

#anonsec : Anonymous Hackers guide how to Mesh Network !

Feb 23, 2011
#anonsec : Anonymous Hackers guide how to Mesh Network ! They Wrote the message : Yes, there is work to do. The idea is to write a how-to on building mesh networks. The n00bs must understand it. Mesh networks are usefull, as they cannot be censored nor shut down. Later on that How-to can become part of Anonymous' uber-secret handbook regarding safety. Version 0.2.0, a downloadable .pdf, can be found there https://goo.gl/SuY0f . Join irc.anonops.ru #anonsec where you find the mesh pad link in the /topic.
Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R using XSS attack (Pakistani Hacker) !

Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R using XSS attack (Pakistani Hacker) !

Feb 23, 2011
Indishell (Indian Hacking Group) Got Hacked By N3t.Crack3R  (Pakistani Hacker) ! Indishell 's Official website Hacked By XSS attack , their forum member ' Chai ' (N3t.Crack3R) . This Hack can be seen within restricted login area so there is no ' zone-h ' Mirror, But ' N3t.Crack3R ' make a video of this hack. Download the Video : Click Here   (File size: 507.47 KB) Note : (Reload Page if 1st time you got error "File Temporarily no avaiblable")
Insecure Magazine : Issue 28 available for Download !

Insecure Magazine : Issue 28 available for Download !

Feb 23, 2011
Insecure Magazine :  Issue 28 available for Download ! Database protocol exploits explained Review: MXI M700 Bio Measuring web application security coverage Inside backup and storage: The expert's view Combating the changing nature of online fraud Successful data security programs encompass processes, people, technology Sangria, tapas and hackers: SOURCE Barcelona 2010 What CSOs can learn from college basketball Network troubleshooting 101 America's cyber cold war RSA Conference Europe 2010 Bootkits - a new stage of development Download
Watcher v1.5.1 Web security testing tool and passive vulnerability scanner download !

Watcher v1.5.1 Web security testing tool and passive vulnerability scanner download !

Feb 23, 2011
Watcher is a Web security testing tool and passive vulnerability scanner. This tool is in continues development and has updated it features and capabilities. Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, it's completely safe to use in Cloud computing, shared hosting, and dedicated hosting environments. Watcher detects Web-application security issues as well as operational configuration issues. Watcher provides pen-testers hot-spot detection for vulnerabilities, developers quick sanity checks, and auditors PCI compliance auditing. It looks for issues related to mashups, user-controlled payloads (potential XSS), cookies, comments, HTTP headers, SSL, Flash, Silverlight, referrer leaks, information disclosure, Unicode, and more. Major Features: Passive detection  of security, privacy, and PCI compliance issues in HTTP, HTML, Javascript, CSS, and development frameworks (e.g. ASP.NET, JavaServer) ...
Dorset HealthCare University NHS Foundation Trust website Hacked !

Dorset HealthCare University NHS Foundation Trust website Hacked !

Feb 23, 2011
HACKERS brought down a website for a health trust serving 700,000 NHS patients in Dorset. The attack, which disabled the site over the weekend, blocked access to the Dorset HealthCare University NHS Foundation Trust website. The trust provides treatment for mental health issues, addiction, dentistry, and some primary care services to patients across the county. Hackers posted a message on the site which read: "Don't mess with me. Site totally hacked" and a cartoon image of a penguin emerging from a shattered computer screen carrying a gun. A jumbled message posted by the hacker on the trust's website read: "You call this security. You must be kidding. If you don't want to get into trouble, patch your admin." Dr Paul Ton de Vrieze, a lecturer in web systems and technologies at  Bournemouth University , said such attacks were often made only for the hacker's satisfaction. "Sometimes people hack sites for their own bravura. They think it is fun to do and show the world that they are...
Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Feb 23, 2011
Kaspersky Lab has released its forecast for the IT threat landscape for this decade (2011 – 2020). Kaspersky bases this forecast on an analysis of the main changes and issues in the sphere of IT security over the past decade, as well as emerging trends in the development of personal computers, mobile phones and operating systems. According to the company's analysts, the most significant trends of the last ten years (2001-2010) were: Mobility and miniaturisation . Smaller and smaller devices can now access the Internet from virtually any point on the globe; making wireless networks the most popular method of connecting to the web. The transformation of virus writing  into cybercrime (Crime committed using a computer and the internet to steal a person's identity, sell contraband, stalk victims or disrupt organisations with malevolent programs). Windows maintaining its leading position  as a vendor of operating systems for personal computers. Intense competition in the mobil...
World's Largest Touchscreen Hacked !

World's Largest Touchscreen Hacked !

Feb 23, 2011
It's gigantic ! It can handle over 100 simultaneous touch points! It has a curvature of 135 degrees! And best of all, it is NOT the newest, insanely expensive gadget to hit the market. Instead, this touchscreen was hacked together with a bunch of PCs, video cameras, projectors and cheap infrared illuminators at the University of Groningen, in the Netherlands. It works like this: "The cameras, illuminators and projectors are all placed behind a large, cylindrical screen (formally used as a 3D theater). Due to the diffuse layer on the front side of the screen, the cameras cannot see clearly through the screen, however whenever someone touches the screen, enough of the infrared light is reflected back to see the tip of the finger. The difference is very small (on a scale of 0-255 the difference is only 2 or 3), but still big enough to be seen by the computers that analyze the images from the cameras." The display is used to teach mathematics and computer science students ...
Kim Kardashian Twitter account Hacked !

Kim Kardashian Twitter account Hacked !

Feb 23, 2011
Many celebrities have fallen prey to Internet pranksters and the latest name added to the list is reality TV star Kim Kardashian, whose Twitter account has been hacked. The 30-year-old socialite has appealed to bosses of the microblogging site to restore the security of her account after she discovered that an imposter had sent fake tweets on her behalf." My twitter has been hacked! Twitter help!!!! I can sign on from my phone app but no where else and see some fake tweets here (sic), " wrote the 30-year-old on her Twitter page." Twitter please help me get my password back! How is it that I can tweet from my cell but my home computer says wrong password! Hacked (sic), " she wrote in a post.Her sister Kourtney added, " Some stalker hacked Kim Kardashian twitter and email... So just beware of her tweets. " Stars who fell victim to Twitter hackers recently are Selena Gomez, rapper Swizz Beatz and British funnyman Matt Lucas.
Anonymous Hackers Call United Nation (UN) for their Responsibilities Regarding Libya !

Anonymous Hackers Call United Nation (UN) for their Responsibilities Regarding Libya !

Feb 22, 2011
Anonymous Hackers Call United Nation (UN) for their Responsibilities Regarding Libya ! NOTE :  One More Press Released By Anonymous Hackers on there official site/Facebook/Twitter. We are Publishing This news, just as the Media of "Hacking Field" . These is No relation b/w 'The Hacker News' & 'Anonymous Hackers'. In their Press Release They wrote : Call the responsibilities of the UN Dear United Nations:   Anonymous wishes you to act.   We are watching the developments in Libya and are shocked. Shocked by the images we've seen. Shocked by the things Libya's Anons have told us. Shocked by the fact that one man ignores the voices of his citizens and opens fire on them. Shocked by the fact that even with generals and diplomats deserting, this man is still ignoring the will of his people and unwilling to accept their human rights People ought not have to fear their leaders; leaders ought to fear their people. In too many places, though, this is cur...
Expert Insights Articles Videos
Cybersecurity Resources