#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Android malware - Works on remote commands form encrypted blog

Android malware - Works on remote commands form encrypted blog

Oct 08, 2011
Android malware - Works on remote commands form encrypted blog Researchers from Trend Micro have spotted a piece of malicious software for Android. This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected device. Trend Micro calls the malware " ANDROIDOS_ANSERVER.A. " If the application is installed, it asks for a variety of permissions. If those are granted, it can then make calls, read log files, write and receive SMSes and access the Internet and network settings, among other functions. This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. " This is a blog site with encrypted content, which based on our research, is the first time Android malware implemented this kind of technique to communicate, " wrote Karl Dominguez, a Trend Micro threat resp...
Microsoft FUSE Labs Sub-domain defaced by Hmei7

Microsoft FUSE Labs Sub-domain defaced by Hmei7

Oct 08, 2011
Microsoft FUSE Labs Sub-domain defaced by Hmei7 Hacker named " Hmei7 " defaced the official sud-domain of Microsoft FUSE Labs ( https://fuse.microsoft.com/ ) as shown above. He wrote a taunt on the home page with signature " are you microsoft?? , hackedby Hmei7 ". Mirror of hack at Zone-H is here .
Suzuki Official Website of Azerbaijan hacked by Co-cain Tm

Suzuki Official Website of Azerbaijan hacked by Co-cain Tm

Oct 08, 2011
Suzuki Official Website of Azerbaijan hacked by Co-cain Tm Suzuki Official Website of Azerbaijan today defaced by Co-cain Tm Hackers. The home page contain following lines: Cg 125 For Ever ! Co-cain Tm Sp Tnx 2 Skitt3r The Mirror of this hack also available on Zone-H . Reason of hack is unknown, supposed to be just for fun.
cyber security

The MCP Security Guide for Early Adopters

websiteWizArticles Intelligence / MCP Security
Thousands of MCP servers are already live, but most security teams don't have a clear strategy yet. Get the practical guide to MCP for security teams.
cyber security

Make Identity Compromise Impossible with the Last Credential You'll Ever Need

websiteBeyond IdentityIdentity Security / Enterprise Protection
Attackers exploit IAM gaps. Learn how Beyond Identity stops phishing, hijacking, and MFA fatigue.
REMnux: A Linux Distribution for Reverse-Engineering Malware

REMnux: A Linux Distribution for Reverse-Engineering Malware

Oct 07, 2011
REMnux: A Linux Distribution for Reverse-Engineering Malware REMnux is a lightweight Linux distribution for assisting malware analysts in reverse-engineering malicious software. The distribution is based on Ubuntu and is maintained by Lenny Zeltser. REMnux is designed for running services that are useful to emulate within an isolated laboratory environment when performing behavioral malware analysis. As part of this process, the analyst typically infects another laboratory system with the malware sample and directs potentially-malicious connections to the REMnux system that's listening on the appropriate ports. REMnux is also useful for analyzing web-based malware, such as malicious JavaScript, Java programs, and Flash files. It also has tools for analyzing malicious documents, such as Microsoft Office and Adobe PDF files, and utilities for reversing malware through memory forensics. In these cases, malware may be loaded onto REMnux and analyzed directly on the REMnux system w...
Student Arrested for hacking Thailand Prime Minister Accounts

Student Arrested for hacking Thailand Prime Minister Accounts

Oct 07, 2011
Student Arrested for hacking Thailand Prime Minister Accounts Prime Minister Yingluck Shinawatra's personal Twitter account was hacked on October 2nd, 2011 in what officials said was possibly part of a conspiracy to embarrass the government. Police in Thailand have arrested a university student who is said to have admitted hacking into the Prime Minister's Twitter account and posting messages accusing her of incompetence. 22-year-old Aekawit Thongdeeworakul, a fourth year architecture student at Chulalongkorn University, could face up to two years in prison if found guilty of illegally accessing computer systems without authorization.
HashCodeCracker v1.2 Video Tutorials Available

HashCodeCracker v1.2 Video Tutorials Available

Oct 07, 2011
HashCodeCracker v1.2 Video Tutorials Available Hash Code Cracker V 1.2 was Released last week by BreakTheSecurity. This software will crack the MD5, SHA1,NTLM(Windows Password) hash codes. No need to install. Supports All platforms(windows XP/7,Linux,..). How to Run Hash Code Cracker Jar using Command Prompt~Password Cracking How to start Hash Code Cracker Jar with double Click~Password Cracking How to Crack the Password using Online Cracker Hash Code Cracker v1.2? Download  here  or from  here
WebCookiesSniffer - New cookies sniffer/viewer utility

WebCookiesSniffer - New cookies sniffer/viewer utility

Oct 07, 2011
WebCookiesSniffer - New cookies sniffer/viewer utility WebCookiesSniffer is a new packet sniffer utility that captures all web site cookies sent between the web browser and the web server and displays them in a simple cookies table. The upper pane of WebCookiesSniffer displays the cookie string and the web site/host name that sent or received this cookie. When selecting a cookie string in the upper pane, WebCookiesSniffer parses the cookie string and displays the cookies as name-value format in the lower pane. Except of a capture driver needed for capturing network packets, WebCookiesSniffer doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - WebCookiesSniffer.exe After running WebCookiesSniffer in the first time, the 'Capture Options' window appears on the screen, and you're asked to choose the capture method and the desired network adapter. The next time you use WebCookiesSniffer, it'...
BlackBerry Security Guide by Incident Response Team (BBSIRT)

BlackBerry Security Guide by Incident Response Team (BBSIRT)

Oct 06, 2011
BlackBerry Security Guide by Incident Response Team ( BBSIRT ) On September 30th, we reported that a Russian security company Elcomsoft , has upgraded a phone-password cracking suite with the ability to figure out the master device password for Research in Motion's BlackBerry devices. In response to this, BlackBerry Security Incident Response Team (BBSIRT) released a small Security guide for Blackberry users: The Elcomsoft tool uses a brute-force attack to guess the smartphone password by attempting to decrypt the contents of a media card that has been removed from the smartphone. For this tool to do what Elcomsoft claims, an IT administrator or the smartphone user must have chosen to encrypt the contents of the media card with the smartphone password only. Furthermore, an attacker must have access to the media card from the smartphone, and the tool would have to successfully guess the password. To then use the password to unlock the smartphone, that attacker would also have to...
NSS Labs offers Bounties for exploits

NSS Labs offers Bounties for exploits

Oct 06, 2011
NSS Labs offers Bounties for exploits ExploitHub, which operates a penetration-testing site and is run by NSS Labs, announced a bug-bounty program for researchers to develop exploits for 12 high-value vulnerabilities in Microsoft and Adobe products. The company, which has set aside $4,400 in reward money, plans to give $100 to $500 to the first people to submit a working exploit for the vulnerabilities. Ten of the vulnerabilities concern Microsoft's Internet Explorer browser and two were found in Adobe's Flash multimedia program. " Client-side exploits are the weapons of choice for modern attacks, including spear-phishing and so-called APTs [advanced persistent threats]. Security professionals need to catch up ," said Rick Moy, NSS Labs CEO. " This program is designed to accelerate the development of testing tools as well as help researchers do well by doing good ." There is no time limit on entering a winning exploit; the first person who submits a working exploit receiv...
GPU cracks 6 character password in 4 seconds

GPU cracks 6 character password in 4 seconds

Oct 06, 2011
GPU cracks 6 character password in 4 seconds An nVidia GeForce GT220 graphics card, which costs about £30, is capable of cracking strong passwords in a matter of hours. Security experts were able to crack a  6 character password in 4 seconds, a 7 character password in less than 5 minutes, and 8 character password in four hours. " People have worked out that the processing power of graphics cards, due to the architecture of the chips, is more powerful than a normal processor for doing certain tasks ," said Neil Lathwood, IT director at UKFast.
Facebook content restrictions bypass Vulnerability

Facebook content restrictions bypass Vulnerability

Oct 05, 2011
Facebook content restrictions bypass Vulnerability Blackhat Academy claims to have found a way to bypass content restrictions on links, as posted on their site and posts put on a user's public wall. Even Security Analysts claim that Facebook was notified of these vulnerabilities on July 31st, 2011. To date (October 4, 2011), Facebook has yet to do anything about this. Facebook has only recently purchased Websense to attempt to push this vulnerability under the rug, however the exploit still works.To access Facebook's FQL API, Facebook was even so kind as to give a reference of tables and columns in the documentation for FQL. FQL does not allow the use of JOINS, however it is not needed as everything is thoroughly documented. Attackers can misuse this during the creation of a malicious Facebook application or directly on the FQL development api page for information gathering. : <?php # User agent checking methods $fb_string = '/facebookexternal/i';         ...
Exploit Pack - An open source security framework

Exploit Pack - An open source security framework

Oct 04, 2011
Exploit Pack - An open source security framework Exploit Pack is an open source security framework developed by Juan Sacco. It combines the benefits of a Java GUI, Python as Engine and well-known exploits on the wild. It has an IDE to make the task of developing new exploits easier, instant search features and XML-based modules. A GPL license for the entire project helps to ensure the code will remain free. It also features a ranking system for contributors, tutorials for everyone who wants to learn how to create new exploits and a community to call for help. Why use Exploit Pack? It has a module editor that allows you to create your own custom exploits. There is an instant search feature built-in on the GUI for easier access to modules. Modules use XML DOM, so they are really easy to modify. It uses Python as its Engine because the language is more widely used on security related programming. A tutorial is also provided. If you want to earn money, they will pay you for eac...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>