#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Role of Hacking in Stealing and Selling Credit Cards !

Role of Hacking in Stealing and Selling Credit Cards !

May 19, 2011
Role of Hacking in Stealing and Selling Credit Cards ! People use the Internet in their everyday lives. With technology advancing as fast as it is, most modern day homes have gone online, turning to the Internet to save time with busy days, performing simple tasks like online banking, purchasing items on eBay or Amazon or getting deals on Buy.com , even taking college classes online. Internet Banking , Credit Cards are become the mode of Payments. Its 2011, Hacker have Eye on your Bank Balance, Credit Card details and Logins. These online Criminals get you Credit Card details and sell them to other customers. Credit card numbers can be purchased for a dollar or less if you buy in bulk And so-called full profiles, including a Social Security number and mother's maiden name, are available for just $80. ATM pin numbers and platinum cards cost extra. Computer hackers have been found stealing and selling other people's credit card information in masses. Hacking happens just...
Linux kernel 2.6.39 released - Update Now !

Linux kernel 2.6.39 released - Update Now !

May 19, 2011
Linux kernel 2.6.39 released - Update Now ! After just 65 days of development, Linus Torvalds has  released  version 2.6.39 of the Linux kernel. The new release includes support for  ipset  which simplified firewall configuration and deployment by allowing updatable and quickly searchable external tables to be used by the network filtering. Interrupt handling can now be handled almost entirely by kernel threads, the ext4 file system and block layers are now able to scale better and show better performance and the kernel now includes a network backend for Xen virtualisation. As always, the new kernel brings hundreds of new or enhanced drivers. For example, support for AMD's current "Cayman" family of high end graphics cards and GPUs arrived with a simple DRM/KMS driver. Also new in this release are drivers for the function keys of Samsung notebooks and the Realtek RTL8192CU and RTL8188CU Wi-Fi chips. Whats News in  Linux kernel 2.6.39 The latest Linux kernel...
Government Directorate Pakistan hacked by lionaneesh

Government Directorate Pakistan hacked by lionaneesh

May 19, 2011
Government Directorate Pakistan hacked by lionaneesh Some of Hacked Users by lionaneesh :  https://pastebin.com/e3htceHt Hacked site : https://www.e-government.gov.pk/
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Malicious PyPI Packages Are Everywhere — A Practical Guide to Defending the Python Supply Chain

Jul 24, 2025
Python supply chain attacks are surging in 2025. Join our webinar to learn how to secure your code, dependencies, and runtime with modern tools and strategies.
The Social-Engineer Toolkit v1.4 latest Version !

The Social-Engineer Toolkit v1.4 latest Version !

May 18, 2011
The Social-Engineer Toolkit v1.4 latest Version ! The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It's main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed. Official change log: Java changed how self signed certificates work. It shows a big UNKNOWN now, modified self sign a bit. Added the ability to purchase a code signing certificate and sign it automatically. You can either import or create a request. Fixed a bug in the wifi attack vector where it would not recognize /usr/local/sbin/dnsspoof as a valid path Fixed a bug in the new backtrack5 to recognize airmon-ng Added the ability to import your own code signed certificate without having to generate it through SET Fixed an issue where the web templates would load two java applets on mistake, it now is correct and only loads one F...
Sony PlayStation Network hacked again, user passwords compromised !

Sony PlayStation Network hacked again, user passwords compromised !

May 18, 2011
Sony PlayStation Network hacked again, user passwords compromised ! With Sony's PlayStation Network freshly back online, attackers have once again breached the system, this time going for a vulnerability with the system's password reset. This is getting (more) ridiculous. Not even two days after Sony restored its embattled PlayStation Network for most users worldwide, cyber criminals have once again launched an attack, this time going after the PSN's password reset system. In order for users to reconnect to the PSN, they were required to reset their passwords. You know, for security reasons… News of this third, most recent attack were originally reported on Nyleveia.com, which warned PSN users that "accounts are still not safe." "I want to make this clear to ALL PSN users. Despite the methods currently employed to force a password change when you first reconnect to the PlayStation network, your accounts still remain unsafe," writes Nyleveia. "A new hack is currently doin...
Dropbox potential security flaw revealed, could be exploited by hackers !

Dropbox potential security flaw revealed, could be exploited by hackers !

May 18, 2011
It seems that information which Dropbox, the popular web-based file-sharing site/service, issued in response to a US Federal Trade Commission complaint, has revealed a potential security flaw that, according to Ray Bryant, CEO of Idappcom, could be exploited by hackers. According to Bryant, after becoming upset with Dropbox's claims over encryption, a security researcher filed an FTC complaint against the network and, as part of its response, the firm revealed that users' files are hash-tagged each time they are uploaded. This means that, if user A uploads, for example, pictures with a given hash-tag and then user B uploads the same name/sized file - with the same hash-tag - their version is not actually uploaded. Put simply, he claims, users A and B share access to user A's first file, without user A's permission. Bryant says it may also be possible to upload an infected version of a popular file on other services and, when other users `upload' the legitima...
Hackmeout.Net Hacked By Shadow008 (PakCyberArmy)

Hackmeout.Net Hacked By Shadow008 (PakCyberArmy)

May 18, 2011
Hackmeout.Net Hacked By Shadow008 (PakCyberArmy) Hacked Site : https://hackmeout.net/ Mirror : https://legend-h.org/mirror/163779/hackmeout.net/
Wi-Fi Security Challenge 3 By Security Tube, Prize: $50 !

Wi-Fi Security Challenge 3 By Security Tube, Prize: $50 !

May 18, 2011
Wi-Fi Security Challenge 3 By Security Tube, Prize: $50 ! Wi-Fi Security Challenge 3: https://www.securitytube.net/video/1884 This challenge has 2 parts: 3a. Never Judge a Packet by its Type: In this challenge the trace file contains a Shared Key Challenge Text and Encrypted Response. You will need to crack the WEP key with just this. 3b. Never Send a N00b to a do a Hacker's Job: In this challenge, you send your N00b apprentice to collect a Wireshark trace. He mistakenly limits the size of the packets and all your get is a truncated encrypted data packet! :( Can you crack the WEP key with just this? Take a shot! All tools / programming platforms required are present on BT4. We don't expect you to scour the web for this :) Prizes: The first person to finish the challenges and send us an email will win $50 worth of goodies from Amazon. Your choice! choose what you want! You can download the trace files and updates from the Challenge Page: https://www.securitytube.ne...
Android phones vulnerable to hackers !

Android phones vulnerable to hackers !

May 18, 2011
Android phones vulnerable to hackers ! Handsets using Google's operating system can allow hackers to access calendars, contacts and private pictures, they claim. Only the latest phones have had the data leak plugged, meaning 99.7 per cent of Android handsets are vulnerable. 'We wanted to know if it is really possible to launch an impersonation attack against Google services,' the German researchers wrote. 'The short answer is yes, it is possible and it is quite easy to do so. 'The adversary can gain full access to the calendar, contacts information or private web albums of the respective Google user. 'This means that the adversary can view, modify or delete any contacts, calendar events or private pictures.' The research was carried out by a University of Ulm team, who studied how Android dealt with log-ins for web-based services. When a user needs to access Google calendar, contacts and photo apps, an authentication 'token' is retrieved. But the tokens are sent unencrypted in p...
SQLi vulnerability in (IPL) Indian Premier League Found by MaDnI - PCA

SQLi vulnerability in (IPL) Indian Premier League Found by MaDnI - PCA

May 18, 2011
SQLi vulnerability in Indian Premier League Found by MaDnI - PCA MaDnI - PCA found Sql Injection vulnerability in (IPL) Indian Premier League website https://www.iplt20.com .  vulnerability  allow to get whole sql database including Logins details and all.  Proof of Vunl : https://pastebin.com/qBMmmdW0
Net pirate monitoring firm hacked !

Net pirate monitoring firm hacked !

May 18, 2011
A firm employed by the French government to track down net pirates has been hacked. Trident Media Guard is believed to have exposed a range of data, including advice on how to avoid detection. TMG monitors peer-to-peer networks as part of France's efforts to find those guilty of copyright infringements. Eric Walter, head of the French anti-piracy unit, confirmed on Twitter that it had "temporarily suspended" links with TMG. France's so-called HADOPI law has caused controversy since it was introduced in 2009. Suspected illegal file-sharers receive three official warnings, after which they are reported to a judge who can hand out a range of punishments, including disconnecting them from the internet. The UK is due to introduce similar legislation, although at this stage it has no plans to punish offenders with disconnection. But it will need to employ a firm similar to TMG. When anti-piracy firms monitor peer-to-peer networks for copyright infringements, they...
Govt militry Engineering services database hacked by MaDnI (PCA)

Govt militry Engineering services database hacked by MaDnI (PCA)

May 18, 2011
Govt militry Engineering services database hacked by MaDnI (PCA) Madni ,member of Pakistan Cyber Army today hack the admin login /password of Govt militry Engineering services at https://www.mes.gov.in/ . Admin login is leaked by him at  https://pastebin.com/AKbci4yH
Expert Insights Articles Videos
Cybersecurity Resources
//]]>