#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

26 Australian Beer/Wine shop websites Hacked By 'Pak Cyber Combat Squad' !

26 Australian Beer/Wine shop websites Hacked By 'Pak Cyber Combat Squad' !

Mar 03, 2011
26 Australian Beer/Wine shop websites Hacked By ' Pak Cyber Combat Squad ' ! 1. https://argentinewine.com.au/pccs.html https://www.zone-h.org/mirror/id/13164024 2. https://www.bestamericanwines.com.au/pccs.html https://www.zone-h.org/mirror/id/13164209 3. https://www.bestargentinianwines.com.au/pccs.html https://www.zone-h.org/mirror/id/13164213 4. https://bestbeers.com.au/pccs.html https://www.zone-h.org/mirror/id/13164216 5. https://www.bestchileanwines.com.au/pccs.html https://www.zone-h.org/mirror/id/13164220 6. https://besteuropeanbeer.com.au/pccs.html https://www.zone-h.org/mirror/id/13164221 7. https://bestitalianwines.com.au/pccs.html https://www.zone-h.org/mirror/id/13164222 8. https://bestliqueurs.com.au/pccs.html https://www.zone-h.org/mirror/id/13164225 9. https://www.bestnewzealandwines.com.au/pccs.html https://www.zone-h.org/mirror/id/13164226 10. https://www.bestpremiumwines.com.au/pccs.html https://www.zone-h.org/mirror/id/13164228 11. https://bes...
Whatismyipaddress.com got attacked !

Whatismyipaddress.com got attacked !

Mar 03, 2011
Whatismyipaddress.com got attacked ! A website whatismyip who gives the information about     * My IP     * IP Lookup     * Blacklist Check     * Trace Email     * Speed Test     * Hide IP     * Change IP     https://whatismyipaddress.com/  got attacked last day its gives a some Sql vulnerablities which shows a vulenerable site ..!! News Source : Cyber-India
New banking trojan capable of hijacking the SSL connections !

New banking trojan capable of hijacking the SSL connections !

Mar 03, 2011
Security researchers from Symantec warn of a new banking trojan capable of hijacking the SSL connections between browsers and online banking sites in a way that is hard to spot. Variants of this malware, which Symantec detects as Trojan.Tatanarg, have been in circulation since last October, but its code is believed to be based on an older threat called W32.Spamuzle. The trojan has a modular architecture, with separate components handling different tasks, and the functionality of most banking malware. It can inject rogue HTML code into pages (man-in-the-browser attacks), disrupt antivirus software, uninstall other banking trojans and enable Windows remote access. It also features a backdoor component through which attackers can issue commands to control the infected computers. However, the most interesting functionality of this trojan is its ability to function as a proxy between browsers and SSL-secured websites. This is achived by hijacking the legit SSL connection and esta...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
Indian Embassy Of Sweden Hacked by Root@localhost - ZCompany Hacking Crew !

Indian Embassy Of Sweden Hacked by Root@localhost - ZCompany Hacking Crew !

Mar 03, 2011
Indian Embassy Of Sweden Hacked by Root@localhost - ZCompany Hacking Crew ! WebSite :  https://www.indianembassy.se/ Mirror 1 : https://mirror-az.com/mirror/?id=13200 Mirror 2 : https://zone-h.com/mirror/id/13159528 News Source :  ZCompany Hacking Crew
Operation Payback is Back with Target 'Copywrong (TBA)' !

Operation Payback is Back with Target 'Copywrong (TBA)' !

Mar 03, 2011
Operation Payback is Back with Target ' Copywrong (TBA) ' ! Just Now one more Press Release posted on Anonymous Official Website, that Operation Payback is back ! The Content of the Press Release is as shown below : Since early 2011, Anonymous has busied itself with very successful operations which it can be very much proud of. Not only has Anonymous proven that it is a force to be reckoned with, it has grown in strength and diversity, and it continues to gain numbers and attract attention from all over the world. Anons all over the world can be proud of what they have achieved. Operation Payback has now begun its "researching" phase, due to some actions taken by some copyright organisations, including "BREIN", who have censored popular sites on the internet over the past couple of weeks. This censorship can't be taken lightly, it is time to avert some attention to them and enable them to realise that this kind of censorship will not be tolerated...
Ashton Kutcher’s Twitter Account Hacked By Geek Activist !

Ashton Kutcher's Twitter Account Hacked By Geek Activist !

Mar 03, 2011
Hey, look: Ashton Kutcher's Twitter  account  was hacked in the name of Internet justice. Someone broke into his account and tweeted the messages above. Judging from their message, they probably used the notorious "Firesheep" application, which makes it easy for anyone to hijack other people's unsecured browsing sessions over wi-fi. The point the mysterious hacker(s) was making is that many of our favourite web applications, like Twitter, don't use high-security "SSL" encryption to protect their data. This makes it easier for people to snoop on users for nefarious means, like cracking down on Internet activists. Facebook recently enabled SSL, to the praise of human rights advocates and consumer groups. Kutcher's at TED right now, so he's probably been the victim of some well-meaning nerd. Kutcher should feel lucky that the person didn't feel like picking fights with random celebrities. Unless he's in on the prank…
Operation Icarus : Will Anonymous shut down the NYSE (New York Stock Exchange) ?

Operation Icarus : Will Anonymous shut down the NYSE (New York Stock Exchange) ?

Mar 02, 2011
Operation Icarus : Will Anonymous shut down the NYSE (New York Stock Exchange) ? Anonymous Hackers starts  Operation Icarus , They Release a Press Release Regarding This, as Posted Below :  Operation Icarus Attention Brothers: The opportunity to create financial chaos and public unrest and from that, there will be a previously unachieved amount of lulz to be had. Charge your lasers and aim them at the the New York Stock Exchange. (NYSE.com) It has been said that humanity is not an end in itself but rather a means to an end. We have shown the world our strength to deny ignorance, overcome adversity, fight oppression and even the power to throw a wrench in the system that perpetuates it. We are enslaved within a matrix of institutions with the illusion that each stands alone, each fighting for power, for profits, for the scraps on the table that represent humanities dwindling resources. In reality however, these institutions; the arms industries, banking and other fi...
#OpLibya : Google launches 'Speak to Tweet' service in Libya !

#OpLibya : Google launches 'Speak to Tweet' service in Libya !

Mar 02, 2011
Big internet company from the United States, Google, appeared to be a mouthpiece for the people of Libya. Google ever did it during the regime of President of Egypt, Hosni Mubarak cut off internet connection. Now, Libya under the power of President Muammar al-Gaddafi also blocked Internet services, including social networking site Twitter. So, Google took the initiative to launch the service of speak to tweet for the people of Libya. The service allows Libyan people to preach the information about the situation in the country to the outside world. They only need to call the phone numbers provided by Google. Furthermore, Google will process and disseminate the information through Twitter account. And, as broadcasted on Al Jazeera TV, this is the phone number provided by Google to be a mouthpiece of the people of Libya: +1 650 419 4196, +3 906 622 0729 4, +4420331 8451 4. GOOGLE LAUNCHES SPEAK TO TWEET SERVICE #LIBYA #BENGHAZI #TRIPOLI PHONE NUMBERS ARE :  +16504194196, +3...
Wireshark 1.4.4 Latest Version Released !

Wireshark 1.4.4 Latest Version Released !

Mar 02, 2011
What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that Wireshark could free an uninitialized pointer while reading a malformed pcap-ng file. (Bug 5652) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. CVE-2011-0538 o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a large packet length in a pcap-ng file could crash Wireshark. (Bug 5661) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. o Wireshark could overflow a buffer while reading a Nokia DCT3 trace file. (Bug 5661) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. CVE-2011-07...
Google buy Reverse Engineering Company Zynamics (German security firm) !

Google buy Reverse Engineering Company Zynamics (German security firm) !

Mar 02, 2011
Google has just acquired a small German software company called Zynamics. The company, which was founded in 2004, focuses on reverse engineering — that is, analyzing software (malware in particular) for which no source code is available. It's an incredibly interesting and complicated problem to try to solve, which makes the Zynamics team and product a perfect fit for Google, a company that's known for tackling interesting and complicated problems. A Google rep said in an e-mail, "We're delighted to have the Zynamics team aboard and hope their tools and skills in fighting malware will help us better protect Google's users." While we're not completely sure what the fate of the company will be, we do know that its goals and expertise line up particularly well with Google's aims in online security. Currently, Zynamics's offerings focus on the needs of information security specialists and malware analysts. Its products are allegedly both innovative and time-saving. The company's ...
A letter to all Anonymous from Anonymous Hackers : Operation shutdown !

A letter to all Anonymous from Anonymous Hackers : Operation shutdown !

Mar 02, 2011
A letter to all Anonymous from Anonymous Hackers : Operation shutdown ! A letter released by Anonymous Hackers for all Anonymous .... as shown below : Anonymous We are anonymous, and we are Legion, for every one of us you find, and everyone you manage to take down, ten shall take his place, we do not forgive, we are many and therefor can't forget. We have conflicting goals and wants, yet we act as one, therefor we are the face of chaos, we are the perfect observer, composed of people from every standpoint and therefor impartial and the only true Harbingers of judgment.  We laugh in the face of tragedy, we mock those in pain, we ruin the lives of other people simply because we can, these things we do for the lolz and we do them with no remorse, no caring, no love, and no sense of morality, we attack all things in this way, we can, we will, and we have destroyed countless that stand to harm anonymous. Our power lies with our numbers. We choice to use loic in our attacks. W...
Nessus 4.4.1 Latest Version Download !

Nessus 4.4.1 Latest Version Download !

Mar 01, 2011
Nessus 4.4.1 Latest Version Download ! New in this version: Scan Scheduling Nessus 4.4 lets you configure scans to run periodically on a daily/weekly/monthly basis. Configure your scans and let Nessus start them at the most appropriate time Enhanced Reporting Nessus 4.4 lets you compare different scans. It also contains two new report templates: "Executive" and "Detailed". Reload plugins during a scan Nessus 4.4 can reload its plugins and configuration files while scans are on-going. No need to interrupt any scan to make use of the newest plugins distributed through the ProfessionalFeed. Lower memory requirements Nessus 4.4 reduces the per-scan memory requirements to half of what the previous version required. The idle size of the Nessus process can be further reduced by changing the backend memory requirements in the configuration file Download : Cilck Here
Expert Insights Articles Videos
Cybersecurity Resources