#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Kuwait Government will suspend Twitter accounts of Anonymous Users

Kuwait Government will suspend Twitter accounts of Anonymous Users

Dec 28, 2011
Kuwait Government will suspend Twitter accounts of Anonymous Users In Kuwait, the Ministry of Interior is in the process of enforcing a rule of their own on Twitter which prevents Kuwaiti users from using anonymous accounts. The ministry said in a press statement that such measure comes in order to preserve the rights of citizens and residents of people who were used to slander them and their families under fake names, saying that such is a crime punishable by law. The statement went on to say that the move was meant to protect the rights of citizens and residents who have found themselves the subject of slander through statements made by these anonymous accounts, a crime punishable by law in the country, as it is in the UAE. It confirmed that all public have the freedom of expression guaranteed to them by the Constitution as long as those practices are going according to the law, especially with regard to using the Twitter site. [ Source ]
Easy Router PIN Guessing with new WiFi Setup vulnerability

Easy Router PIN Guessing with new WiFi Setup vulnerability

Dec 28, 2011
Easy Router PIN Guessing with new WiFi Setup vulnerability There is a newly discovered vulnerability in the WiFi Protected Setup standard that reduces the number of attempts it would take an attacker to brute-force the PIN for a wireless router's setup process. The flaw results in too much information about the PIN being returned to an attacker and makes the PIN quite weak, affecting the security of millions of WiFi routers and access points. Security researcher Stefan Viehbock discovered the vulnerability (PDF) and reported it to US-CERT .  The problem affects a number of vendors' products, including D-Link, Netgear, Linksys and Buffalo. " I noticed a few really bad design decisions which enable an efficient brute force attack, thus effectively breaking the security of pretty much all WPS-enabled Wi-Fi routers. As all of the of the more recent router models come with WPS enabled by default, this affects millions of devices worldwide " Viehbock said. " One ...
New Zealand agencies can be next target after US host was hacked

New Zealand agencies can be next target after US host was hacked

Dec 27, 2011
New Zealand agencies can be next target after US host was hacked Sensitive information about the Department of Prime Minister and Cabinet and other New Zealand agencies can be the next target after US host was hacked. US intelligence firm Stratfor had its website hacked by activist group Anonymous on Monday and data including credit card details of its clients, was stolen. The hackers claim Stratfor's more than 4000 clients include the US Defence Department, Microsoft, New Zealand Police, New Zealand Fire Service and Air New Zealand. A spokesperson for the Department of Prime Minister and Cabinet, Rob Mackie, says it's confident no information's at risk,  but was looking into whether anything had been compromised.  Stratfor's website remains under maintenance since the cyber attack.  He says the bigger concern is whether Stratfor is worth subscribing to, considering they were unable to keep their own information secure.
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
CPLC Chief says 'Pakistan a safe heaven for cyber criminals'

CPLC Chief says 'Pakistan a safe heaven for cyber criminals'

Dec 26, 2011
CPLC Chief says ' Pakistan a safe heaven for cyber criminals ' The cyber crimes of multiple kinds in Pakistan have increased by five times over the past four years. Pakistan Daily Times News today reported that, Citizen Police Liaison Committee (CPLC) Chief through a letter on Saturday, apprised the Federal Law, Justice & Parliamentary Affairs Minister that in the absence of Prevention of Electronic Crime Ordinance (PECO) Law 2007, lapsed in 2010, Pakistan had become a safe heaven for cyber criminals and con artists whereas the law enforcement agencies were unable to take legal action against them. According to the Cyber Crime Unit (CCU), a branch of Pakistan's Federal Investigation Agency (FIA), 62 cases were reported to the unit in 2007, 287 cases in 2008 and the ratio dropped in 2009 but in 2010 more than 312 cases were registered in different categories of cyber crimes. " There are numerous complaints regarding fake calls deceiving citizens into receiving a ...
French MP Valerie Boyer’s website hacked by Turkish hackers

French MP Valerie Boyer's website hacked by Turkish hackers

Dec 26, 2011
French MP Valerie Boyer 's website hacked by Turkish hackers Hackers have attacked the website ( www.valerie boyer.fr ) of French parliamentarian Valerie Boyer, the author of the bill criminalizing genocide denial that was recently adopted by the French National Assembly. The hackers posted a Turkish flag and an address to the French government and the Armenians community of the country. The message says that the bill was meant to reap votes in 2012 election.French National Assembly passed a bill criminalizing public denial of the Armenian Genocide. If passed and signed into law by the Senate, the bill would impose a 45,000 euro fine and a year in prison. Ms. Boyer said she called the police after she and her family members received death threats.On December 22, 2011, French National Assembly passed a bill criminalizing public denial of the Armenian Genocide. If passed and signed into law by the Senate, the bill would impose a 45,000 euro fine and a year in prison for anyone in Fr...
Tianya, China's biggest online forum 40 million users data leaked

Tianya, China's biggest online forum 40 million users data leaked

Dec 26, 2011
Tianya,  China's biggest online forum 40 million users data leaked Tianya.cn , China's biggest online forum confirmed on Sunday that private information for 40 million users had been leaked, three days after the country's largest programmers' website CSDN reported a similar leak . Tianya is one of the most popular sites in China; it's the nexus of China's online communications, a collection of simple forums, blogs, and groups; due to uber-popularity Tianya is the best place in China's web to find public opinion on social issues, cultural experience, and original fresh content from millions of Chinese users. Based on netizen comments, the Tianya community meets the need for personal interaction, creation and expression. In a family oriented society, Tianya is China's dinner table, where news of the day is discussed in an open, personal fashion. The user account information of several other popular websites in China such as Dodonew.com, 7K7K, Duowan.com, and 178.com ...
Ultimate Encoder - PHP Encoder with multiple compression by lionaneesh

Ultimate Encoder - PHP Encoder with multiple compression by lionaneesh

Dec 26, 2011
Ultimate Encoder - PHP Encoder with multiple compression by lionaneesh " Ultimate Encoder " - Another Online tool by lionaneesh , an Indian developer and Hacker. Its a PHP Encoder with multiple compression. A Piece of code can be encoded multiple times making it impossible for any Anti Virus to detect it. Here is comparison of are results of Antivirus Scans: Before Encoder After Encoder Try This Tool
India orders Net firms to censor themselves

India orders Net firms to censor themselves

Dec 26, 2011
India orders Net firms to censor themselves Some of the world's top websites will have to purge themselves of all content that is offensive to Indians by February 6. The companies must update their progress on the effort within two weeks, a court in New Delhi ordered on Saturday, the reports say. The demand is the Indian government's latest attempt to monitor and control electronic information. Facebook, Microsoft, YouTube, Google, among 21 others will have to strip their websites off any objectionable content. Given that some of the Internet scandals that have hit India recently that will include all images of women kissing men. Reports say India is pressing major Internet firms to filter out what the government considers unacceptable material, including religiously sensitive images and altered images of politicians. 21 social networking sites, including the ones mentioned above have been " issued summons " by the court, on grounds of carrying objectionable content....
Siemens multiple domains hacked by Hmei7

Siemens multiple domains hacked by Hmei7

Dec 25, 2011
Siemens multiple domains hacked by Hmei7 Indonesian hacker Hacker named " Hmei7 " previously in news for hacking Microsoft and IBM , yesterday hack and deface 6 domains of Siemens company.  Defaced websites come from different TLD which include the Ecuador, Peru, Venezuelan, Colombia and Brazil and two of the defacement's come from the Brazil zone. Ecuador |  mirror Peru |  mirror Venezulan  |  mirror Colombia |  mirror Brazil  |  mirror
Best Free Android Security Software Avast Antivirus

Best Free Android Security Software Avast Antivirus

Dec 24, 2011
Best Free Android Security Software Avast Antivirus For you who longing for free Android antivirus, this is an exciting THN news for you. Avast, one of the famous antivirus vendors, now has launched Android Antivirus you can use for free! This Antivirus mobile is named Avast Mobile Security . Avast Free Mobile Security supports a number of features that are usually available only in paid-for Android security software. These include privacy reports, call and SMS filtering, SIM-card change notifications, firewall and application management. By using Avast Mobile Security in your Android phone, your cell phone will be protected from virus, threat, hacker, even it's able to minimize your loss if your Android cell phone is stolen. The antivirus component supports real-time protection and automatic updates. Updates can be configured to only be downloaded over certain types of connections and the interface can be protected with a password. Call and SMS filtering can help device owne...
ANONdroid v. 00.00.008 : JonDonym proxy client for Android released

ANONdroid v. 00.00.008 : JonDonym proxy client for Android released

Dec 24, 2011
ANONdroid v. 00.00.008 : JonDonym proxy client for Android released ANONdroid is a JonDonym proxy client for Android smartphones. This nice piece of software is under ongoing development by the AN.ON project of the university Dresden. Project leader is Dr. Stefan Köpsell. ANONdroid uses the core libraries of JonDo with a smartphone compatible GUI. ANONdroid acts as a proxy for your internet applications and will forward the traffic of your internet applications encrypted to the mix cascades. It is still under development, but a first version is ready for download from the Andoid market . a secure browser configuration is important for anonymous surfing we recommend the use of Orweb browser. It is a browser for Orbot, but can be used with ANONdroid too. After installation you have to change the proxy settings of Orweb to localhost:4001. How It Works When you start the JAP client program, JAP first connects to the InfoService to check if the program version is still current. If t...
Official Android Market host many Malware Games

Official Android Market host many Malware Games

Dec 24, 2011
Official Android Market  host many Malware Games F-Secure researchers recently found malware in the Android Market disguised as free versions of popular games. Disguising malware as a free version of a popular game (such as Cut the Rope and Assassin's Creed) seems to be a popular tactic that the bad guys are using to scam users of Google's Android Market app store. Overnight more malware appeared in Google's official app repository. The Trojanized games have been uploaded by a company calling itself Eldar Limited . This is the second time in two weeks malware disguised as free games has been uploaded to the Android Market. Google's app police managed to detect this fraud and quickly removed it from the Android Market. While the apps are still listed on AppBrain and AndroidZoom, the links will direct users back to the official Android Market where they have already been removed. " These have now been removed by Google, but their appearance in the official Android Market in...
Expert Insights Articles Videos
Cybersecurity Resources