#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Vulnerability in Facebook Email feature Exposed !

Vulnerability in Facebook Email feature Exposed !

Apr 02, 2011
Vulnerability in Facebook Email feature Exposed ! This time Facebook username feature is Vulnerable. After Facebook applications, now Facebook username feature can be used to do on Facebook profiles. Not only spam's but this bug can be used to post illegitimate messages to Facebook users from their friends or either from unknown people without the consent of sender Total Exposure : Knowledge of Facebook id and associated registered email address are the key elements to launch the exploit i.e., to postage of factitious messages on behalf of target user. Other than posting messages, spams are equally potential through this vulnerability. Scenario: To effectively launch the attack the minimum scenario consist on the following : Target username of Facebook user1 (xxxx@facebook.com) and an email id of another Facebook user2 (any email,that used to register the facebook account). To launch the attack an attacker can post fictitious private messages on behalf of target user2 to th...
315 more Website Has Been Hacked By Dinelson US

315 more Website Has Been Hacked By Dinelson US

Apr 02, 2011
315 more Website Has Been Hacked By Dinelson US Hacked sites list :  https://pastebin.com/4CvVMPTz
50 Wesbsites Hacked By ahmdosa Hacker

50 Wesbsites Hacked By ahmdosa Hacker

Apr 02, 2011
50 Wesbsites Hacked By Ahmdosa Hacker Hacked sites :  https://pastebin.com/XE254JRC
cyber security

Free Tool: Help Desk Verification Codes

websitePush SecurityThreat Detection / Identity Security
Get secure, rotating codes in employee browsers to verify their identity and stop Scattered Spider breaches.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked

April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked

Apr 02, 2011
April Fool Hack : Innobuzz (Ethical Hacking Training Institute) hacked The site was self Defaced by Innobuzz for making April Fool to all  ;-)
'The Hacker News' Magazine - Anonymous Edition - Issue 01 - April,2011 Download now !

'The Hacker News' Magazine - Anonymous Edition - Issue 01 - April,2011 Download now !

Apr 01, 2011
' The Hacker News ' Magazine - Anonymous Edition - Issue 01 - April,2011 Download now ! Link :  https://theevilhackerz.com/magazine-01-low.pdf 'The Hacker News' Magazine contacts : Mohit Kumar, Editor in Chief Email -  thehackernews@gmail.com Facebook Profile -   https://www.facebook.com/unix.root Twitter Profile -  https://twitter.com/TheHackersNews Facebook Page -  https://www.facebook.com/thehackernew
Fake 'Walk and Text' App steals Android user data !

Fake 'Walk and Text' App steals Android user data !

Mar 31, 2011
Android users who download a pirated copy of the Walk and Text app are strolling smack into trouble. The rogue app, called Android. Walkinwat, is a corrupted version of the legitimate Android Walk and Text app, the security firm Symantec reported. Walk and Text, which can be found in many third-party app stores in North America and China, uses a smartphone's camera to show users what's in front of them as they're walking and texting. Once Walkinwat is downloaded, a dialogue box appears on the user's phone that, according to Symantec, "gives the appearance that the app is in the process of being compromised or cracked, when, in fact, the app is gathering and attempting to send back sensitive data (name, phone number, IMEI information, etc.) to an external server." This is far from the first instance of a corrupted Android app that harvests user data; in early March, a rogue piece of software called DroidDream was found in 58 apps, which were downloaded more than 200,000 times befor...
IEEE members database hacked !

IEEE members database hacked !

Mar 31, 2011
A hacker stole the credit card details of over 800 members of the IEEE (Institute of Electrical and Electronics Engineers) last December, according to its law firm. A team of IEEE-appointed forensic investigators "concluded that a file containing customer credit card information had been deleted on or about November 17, 2010", the institute's law firm told the Attorney General of New Hampshire in February [pdf]. The forensic team believed that 828 members' credit card numbers, associated names, expiration dates and security numbers may have been accessed. It discovered "certain vulnerabilities in the system", but the IEEE had no proof that the exposed credit cards had been used to make fraudulant transactions, according to the letter.
Indian Institute Bansal IIT-JEE Hacked, Student Database Leaked by Cyb3R_Shubh4M

Indian Institute Bansal IIT-JEE Hacked, Student Database Leaked by Cyb3R_Shubh4M

Mar 31, 2011
Indian Institute Bansal IIT-JEE Hacked, Student Database Leaked by Cyb3R_Shubh4M Hacked Site : https://bansaliitjee.com/ Student Database Leaked, Downlaod : [Link Removed For Safety]
Hacker group defies U.S. law, defends exposing McAfee vulnerabilities !

Hacker group defies U.S. law, defends exposing McAfee vulnerabilities !

Mar 31, 2011
The hacker group that exposed holes in McAfee's website knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor websites. The hacker group that exposed holes in McAfee's website knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor websites. "We do understand performing security testings without authorization is illegal under U.S. law," stated YGN Ethical Hacker Group, when contacted by Network World via e-mail. The outfit's own website describes YGN as a "small group of young but mature people" based in the country of Myanmar (Burma) who started working together about three years ago. Based on its website advertising, the group, which seeks to emphasize its goals are "ethical," appears to offer vulnerability-testing services while also working on security testing tools. In response to a question about why it's so secretive,...
Farmville Compromises Facebook - Facebook Fixes Flaw !

Farmville Compromises Facebook - Facebook Fixes Flaw !

Mar 31, 2011
After the release of FireSheep, Facebook took an important step to help protect Facebook user accounts by allowing users to choose to keep an encrypted connection as long as they used just Facebook and intelligently designed apps. Savvy users immediately discovered that if they tried to use grossly insecure apps such as Farmville, 21 Questions, or a variety of apps by Rockyou then you were switched back to an unencrypted connection. Having an unencrypted connection means that if you are on an unsecured network, such as those frequently found in coffee shops, airports, and many other public places, then another person can mess around with your account and do things like post messages as if they were you. In fact, they are actually logged into your account for the session, but they don't have your password, so there are some security features they can't change. Still it is enough access that they can cause a lot of damage. Facebook has addressed the problem by making it so that if y...
Bcwars.com & Pokerrpg.com hacked 200k Email and Plain text passwords !

Bcwars.com & Pokerrpg.com hacked 200k Email and Plain text passwords !

Mar 31, 2011
Bcwars.com & Pokerrpg.com hacked 200k Email and Plain text passwords ! Bcwars.com & Pokerrpg.com hacked 200k Email, also admin used plain text passwords. Used Sql Injection :  https://bcwars.com/forum/category/-3' union select concat(id,'::::',username,':::::::',password,':::::::',email) from tblUsers-- - Bcwars Database :  https://bit.ly/hD6bEE https://rapidshare.com/files/455184098/tblUsers-bc.sql.zip https://www.megaupload.com/?d=P4B30IVR https://depositfiles.com/de/files/u7unbc4vk https://hotfile.com/dl/112676282/bcd44f5/tblUsers-bc.sql.zip.html https://www.zshare.net/download/884416713e3e2044/ https://uploading.com/files/3e13f3be/tblUsers-bc.sql.zip/ Pokerrpg Database :  https://bit.ly/hgCGJx https://rapidshare.com/files/455184096/tblUsers.sql-poker.zip https://www.megaupload.com/?d=T41NF4SV https://depositfiles.com/de/files/8qgnt9gll https://hotfile.com/dl/112676281/bea47ec/tblUsers.sql-poker.zip.html https://www.zshare....
Keyloggers in Samsung Laptops, Officials says - Samsung laptops are in fact secure !

Keyloggers in Samsung Laptops, Officials says - Samsung laptops are in fact secure !

Mar 31, 2011
Keyloggers in Samsung Laptops , Officials says - Samsung laptops are in fact secure ! We'll start by saying that we've reached out to  Samsung  for a response here, but as of now, no reply has been given -- neither a confirmation nor a refusal of truth. Why bother mentioning that? If this here story proves true, Sammy could have a serious problem on its hands -- a problem that'll definitely start with a rash of negative PR, and a quandary that could  very well end the outfit up in the courtroom . According to a report by Mohamed Hassan over at  Network World , Samsung allegedly took the initiative to install a keylogger into his recently purchased R525 and R540 laptops. The app was noticed right away after a security scan on both systems, with StarLogger popping up with the c:\windows\SL directory. Where things really get strange is on the support line; reportedly, a supervisor informed Mr. Hassan (after an earlier denial) that the company did indeed install the ...
Expert Insights Articles Videos
Cybersecurity Resources