#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hackers Could Exploit Federal Government Shutdown !

Hackers Could Exploit Federal Government Shutdown !

Feb 25, 2011
The federal government's list of emergency network security personnel has not been updated in 15 years, putting national security at high risk if a shutdown takes place on March 4. The possible government shutdown scheduled for March 4, 2011 could trigger a cyberwar emergency. If non-essential government employees end up being furloughed in early March, the federal government's computer systems will be run by a shortlist of critical-need employees. One major problem: The federal government's list of critical-need computer security employees has not been updated in over 15 years. According to the influential Nextgov website, the government's emergency call-up IT security list was last updated in 1995, ahead of the last federal government shutdown. "In 1995, we already had that decided," said Hord Tipton, a former Interior Department chief information officer who was Bureau of Land Management assistant director for resource use and protection during the ...
Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Xss venerability in 'The Times of India' website Found by Rahul Roshan !

Feb 25, 2011
Xss venerability in ' The Times of India ' website Found by Rahul Roshan ! Link : Click Here
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download !

Feb 25, 2011
Extreme Exploits : Advanced Defenses Against Hardcore Hacks Ebook Download ! This cutting-edge volume takes network security professionals to the next level in protecting networks and web sites. Never-before-published advanced security techniques and concise explanations of core Internet infrastructure explain how to defend against devastating vulnerabilities in systems and the underlying network. With the authors' winning methodology for attack profiling and the theatre of war concept, you'll learn how to architect and prepare your network for threats that don't yet exist. By explaining specific in-depth technologies in use by not only the attackers, but also inside the applications they target, this book enables the reader to make better use of the tools available today, and to design new tools, techniques, and operational policies for the future. Download : Click Here
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
An Open Letter to PayPal from Anonymous Hackers !

An Open Letter to PayPal from Anonymous Hackers !

Feb 25, 2011
An Open Letter to PayPal from Anonymous Hackers ! Just Now  Anonymous Hackers Publish and open letter to Paypal , The Copy of Letter is as Given Below : Dear PayPal staff, In recent news (reference below) we took notice that you froze the account of Courage to Resist, the organization raising funds for legal support of U.S. Army Pfc. Bradley Manning. We regret to learn that after the massive protest in December 2010, PayPal has yet to appreciate  the untenable position they have found themselves in. PayPal stands at the epicenter of the  conflict of interests between the United States government and the First Amendment of the  United States Constitution. You are already aware that Bradley Manning's motives and reasoning  are politically grounded. However, his motives and/or reasoning are not and should not be any  concern to you. Additionally, by refusing to process the aforementioned legal funds you are  patently interfering with the defendant...
Cyber crime Complaints in US Fell by 10% in 2010 !

Cyber crime Complaints in US Fell by 10% in 2010 !

Feb 25, 2011
The U.S. agency that tracks complaints of criminal activity on the Internet reported Thursday that fewer people complained about Internet fraud in 2010 than in the previous year. The Internet Crime Complaint Center (IC3) runs a Web site where victims can report details of any cyberfraud. It shares the data with law enforcement agencies to help them hunt down criminals. Last year it received 303,809 complaints, almost 10 percent fewer than the previous year's total of 336,655. The IC3 is run by the U.S. Federal Bureau of Investigation and the National White Collar Crime Center. It released its annual report Thursday, based on data submitted in 2010. The largest single source of complaints was from people who had been duped by criminals posing as buyers and sellers. International scammers, preying on eBay and Craigslist users, have made millions over the past decade. Just last week, a Romanian national, Adrian Ghighina, pleaded guilty to his role in a scam that took in $2.7 ...
Google tweaks Search algorithm to reduce the search spam !

Google tweaks Search algorithm to reduce the search spam !

Feb 25, 2011
Google has warned that search rankings will be changing after it refined its systems to weed out content farms and other search spammers. Changes made in the last 24 hours have "noticeably impacts" on around 12 per cent of search queries. The changes are designed to block out so-called content farm – sites which contain a large amount of copied or poor quality content. Instead sites which contain original content, research and analysis will receive preferential treatment. " We can't make a major improvement without affecting rankings for many sites. It has to be that some sites will go up and some will go down ," said the  Google blog . "It is important for high-quality sites to be rewarded, and that's exactly what this change does." Google said that the changes had not been influenced by the results of its Chrome Blocklist extension, which was launched last week. However it said that the top few dozen sites it had downgraded matched the data from the extension by 84 per cent. Th...
Anonymous Hackers send a video message to Westboro Baptist Church !

Anonymous Hackers send a video message to Westboro Baptist Church !

Feb 24, 2011
Anonymous doesn't kid around and the Westboro Baptist Church learned that the hard way. The hacktivist group took down their website and left a stern message. The two groups, the radical hackers which launch denial-of-service attacks and the radical religious organization which preaches its message about God by protesting military funerals, have been sparring through the Internet and online message boards. The feud began with a "letter" from Anonymous to Westboro Baptist Church, explaining if the church didn't stop their "benighted gospel of hatred" and "fascist views," Anonymous would target their websites. Then WBC responded to the letter telling Anonymous to "bring it." Anonymous followed that by explaining the initial letter was a trap set up by "attention whoring idiots." WBC took exception to that and said in reality, Anonymous had attempted, and failed, to hack their sites. WBC spokesperson Margie Phelps said the se...
St George's University of London medical school's Database Hacked !

St George's University of London medical school's Database Hacked !

Feb 24, 2011
The Metropolitan Police were called in after vandals breached a database maintained by  St George's University of London medical school  and sent obscene mails to the users of the database. The emails claimed that the database was "closed due to Aids", and that university executive board members were involved in child pornography. The Guardian newspaper reported that the breach occurred last week in the Primary Care Electronic Library [PCEL] database, a list of UK based doctors and nurses. PCEL does not contain patient medical records. According to the university, only the PCEL database server was affected and not the main university server. Confidential details of partners, staff and students were not compromised.
Lush website is back online after hacking !

Lush website is back online after hacking !

Feb 24, 2011
POOLE-based cosmetics retailer Lush is back online after it was forced to suspend internet sales after hackers attacked its website. Lush closed the site last month and asked anyone who placed an online order between October 4 and January 20 to contact their bank in case their card details had been compromised. A temporary site was back up and running late on Friday, before the full website re-launches. Shoppers are now being directed away from the Lush site when they come to the checkout, making payments at the Worldpay site. An online message to shoppers reads: "You can shop with confidence knowing that your details will be safe. Meanwhile the rest of the site has been tested by external experts to check that our processes are all as secure as they can be." It adds: "Thank you all for coming back to us and trusting us to serve you again." Lush became aware that its security had been breached on Christmas Day and investigated, but only told customers on January 21 when it sh...
Angel (4d0r4b13) help Admin to fix vulnerabilities of Website !

Angel (4d0r4b13) help Admin to fix vulnerabilities of Website !

Feb 24, 2011
Angel (4d0r4b13) help Admin to fix vulnerabilities of Website ! Mr. Nitin , owner of websites  https://www.lohchab.in/ and https://site2sms.com/  has email us and inform that recently his website was got hacked and after that Mr. Angel (4d0r4b13) , an Indian Hacker help him to find and Patch vulnerabilities in his site. The Personal Suggestion to all Hackers from ' The Hacker News ', that rather than wasting time on hacking others site,Help admins to find and Fix the venerabilities.That will be best use of your knowledge and help in securing your own country. 
Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Ankit Fadia (Ethical Hacker and Cyber Security Expert) is also Not Secure !

Feb 24, 2011
Ankit Fadia ( Ethical Hacker and Cyber Security Expert ) is also Not Secure ! Ankit Fadia, 21 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 11 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. Now the question raised that, is Mr. Ankit Fadia is Secured ? We have Notice that lots of Hackers from various countries are able to access his Site & Ftp , Even some of them are just only 15 years old. Last Days some images was uploaded on Facebook by some hackers, which shows that they access Ankit's Official Website and Ftp. Even they 'Root' The Server via uploading Shell . The guy who earn crores from Seminars ,is he can't audit his own security and can't afford a secure and...
Texas Man admits hacking into e-commerce servers of NASA !

Texas Man admits hacking into e-commerce servers of NASA !

Feb 24, 2011
A Texas man has admitted hacking into servers owned by an e-commerce company and making off with about $275,000. Jeremey Parker of Houston also copped to charges of breaking into servers maintained by NASA's Goddard Space Flight Center in Maryland and causing some $43,000 of damage. The hacking spree spanned a 10-month stretch starting in December 2008 with the breach of systems owned by SWReg. A subsidiary of Digital River of Minnesota, the company manages royalties for independent software developers. "Parker hacked into SWReg's system, created the money by crediting the SWReg accounts, and then caused that money to be wire transferred to his bank account instead of the accounts of several developers," a press release issued by the US Attorney's office in Minnesota said. The NASA servers Parker hacked gave paying members of the scientific community access to oceanic data being sent to Earth from satellites. Eventually, the data was made available to everyone. Parker...
Expert Insights Articles Videos
Cybersecurity Resources