-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Ascend D quad : World's fastest Android by Huawei

Ascend D quad : World's fastest Android by Huawei

Feb 27, 2012
Ascend D quad : World's fastest Android by Huawei Huawei has introduced what it calls the world's fastest quad-core smartphone, the Huawei Ascend D quad. Powered by Huawei's K3V2 quad-core 1.2GHz/1.5GHz processor the beast comes with Android 4.0. In an aggressive presentation at the Mobile World Congress Show in Barcelona, Huawei repeatedly compared its new product to Samsung’s Galaxy Nexus and Apple’s latest iPhone. Huawei also unveiled the Ascend D quad XL and Ascend D1. Both devices include 32-bit true color graphic processors, an 8-megapixel rear-facing camera with 1080p full HD video capture and a 1.3-megapixel front-facing camera with 720p video capture. The phone also has Dolby 5.1 Surround Sound and Audience earSmart voice technology and an 8-megapixel BSI rear-facing camera, 1.3 megapixel front-facing camera, and 1080p full HD video-capture and playback capabilities. Ascend D Quad is much faster, too- 20 percent to 30 percent faster, in fact, than one running...
WikiLeaks suspect Bradley Manning nominated for Nobel Peace Prize 2012

WikiLeaks suspect Bradley Manning nominated for Nobel Peace Prize 2012

Feb 27, 2012
WikiLeaks suspect Bradley Manning nominated for Nobel Peace Prize 2012 A spokesman for the Nobel Peace Prize jury says 231 nominations have been submitted for this year's award, with publicly disclosed candidates including WikiLeaks whistle-blower Bradley Manning may be among the hundreds of nominees for the 2012 Nobel Peace Prize, rights activists say. Bradley Manning, a 23-year-old Army intelligence analyst, is accused of leaking a video showing the killing of civilians, including two Reuters journalists, by a US Apache helicopter crew in Iraq. He is also charged with sharing the documents known as the Afghan War Diary, the Iraq War Logs, and embarrassing US diplomatic cables, with the anti-secrecy website WikiLeaks. The video and documents have illuminated such issues as the true number and cause of civilian casualties in Iraq, human rights abuses by U.S.-funded contractors and foreign militaries, and the role that spying and bribes play in international diplomacy. Among th...
#WikiLeaks publishes millions of Hacked Stratfor E-mails #gifiles

#WikiLeaks publishes millions of Hacked Stratfor E-mails #gifiles

Feb 27, 2012
#WikiLeaks publishes millions of Hacked Stratfor E-mails #gifiles WikiLeaks today began publishing more than five million confidential e-mails from US-based Intelligence firm Stratfor.  About 5.5m emails obtained from the servers of Stratfor, a US-based intelligence gathering firm with about 300,000 subscribers and has been likened to a shadow CIA. The emails, snatched by hackers, could unmask sensitive sources and throw light on the murky world of intelligence-gathering by the company known as Stratfor, which counts Fortune 500 companies among its subscribers. Stratfor in a statement shortly after midnight said the release of its stolen emails was an attempt to silence and intimidate it. The Online organisation claims to have proof of the firm's confidential links to large corporations, such as Bhopal's Dow Chemical Co and Lockheed Martin and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency....
cyber security

Eliminate Shadow AI Blind Spots

websiteNudge SecuritySaaS Security / Shadow AI
Shadow AI is quietly accessing sensitive data across your SaaS environment. Learn how to close AI blind spots and get ahead of data exposure risks.
cyber security

OpenClaw: RCE, Leaked Tokens, and 21K Exposed Instances in 2 Weeks

websiteReco AIAttack Surface / AI Agents
The viral AI agent connects to Slack, Gmail, and Drive—and most security teams have zero visibility into it.
Internet censorship in Pakistan, National Filtering and Blocking System

Internet censorship in Pakistan, National Filtering and Blocking System

Feb 26, 2012
Internet censorship in Pakistan , National Filtering and Blocking System A Pakistan government department has called for proposals for the development, deployment and operation of a national level URL Filtering and Blocking System. The proposal request states that each box of the system “ should be able to handle a block list of up to 50 million URLs with a processing delay of not more than 1 millisecond. ” According to a request for proposals from the National ICT (Information and Communications and Technologies) R&D Fund, the Pakistani government is struggling to keep a lid on growing Internet and Web use and is looking for a way to filter out undesirable Web sites. The 'indigenous' filtering system would be 'deployed at IP backbones in major cities, i.e., Karachi, Lahore and Islamabad,' the RFP . According to a post on EEF , Ever since the Pakistan Telecommunication Act, passed in 1996, enacted a prohibition on people from transmitting messages that are “ fals...
Hackers leak objectionable Photos from LA cops inbox

Hackers leak objectionable Photos from LA cops inbox

Feb 25, 2012
Hackers leak objectionable  Photos from LA cops inbox CabinCrew group of Hackers, that claims to have found, and reported, objectionable photos of children in an officer's private e-mail account, anonymously posted hacked police data to a website. More than 100 local law enforcement officers had their private information pilfered and published on a public website prompting a response from the FBI " Over the past three weeks, we in the cabin have been targeting law enforcement sites across the United States, be it for injustices they have allowed through ignorance or naivety, taken part in, or to point out the fact that their insecurity failed to protect the safety of those they took an oath to serve, " the hacker statement on the Pastebin site said. The hackers posted officers' property records, campaign contributions, biographical information and, in a few cases, the names of family members, including children. Authorities said the current intrusion is different ...
Facebook app spreading Android Malwares

Facebook app spreading Android Malwares

Feb 25, 2012
Facebook app spreading Android Malwares Even though Google recently introduced a malware-blocking system called Bouncer to keep the Android Market safe from malicious software, crafty spammers and fraudsters are still managing to find ways around the restrictions to get their software onto users’ phones. Security firm, Sophos have reported that there is malware going around via the Facebook application. The malicious software disguises itself as an Android app named “any_name.apk” or “allnew.apk” and is sent to Android phones via Facebook’s mobile app.  An Android user may receive a Facebook friend request and if the user goes to the requester’s profile to check them out, they could be diverted to another web page instead, where the malicious app will be automatically downloaded. Although Android doesn’t by default allow apps to be automatically downloaded, some users choose to turn off this protection in order to have access to apps distributed outside of the Android Market. ...
Millions of pcAnywhere users still Vulnerable to hijacking

Millions of pcAnywhere users still Vulnerable to hijacking

Feb 24, 2012
Millions of pcAnywhere users still Vulnerable to hijacking 3 weeks before we reported that Symantec releases patch to address pcAnywhere source code exposure, because attackers had obtained the remote access software's source code. But According to H.D. Moore, chief security officer at Rapid7, estimated 150,000 to 200,000 PCs are running an as-yet-unpatched copy of the Symantec software. While Symantec said it had patched all the known vulnerabilities in pcAnywhere. Symantec has released new information and a patch to address the recent code exposure incident. According to Computerworld report, PCs connected to the Internet, including as many as 5,000 running point-of-sale programs that collect consumer credit card data, could be hijacked by hackers exploiting bugs in the troubled program. Symantec released a patch that eliminates known vulnerabilities affecting pcAnywhere 12.0 and pcAnywhere 12.1.At this time, Symantec recommends that all customers upgrade to pcAnywh...
Zero-day Smartphone Vulnerability exposes location and User Data

Zero-day Smartphone Vulnerability exposes location and User Data

Feb 24, 2012
Zero-day Smartphone Vulnerability exposes location and User Data Smartphones are increasingly becoming the preferred device for both personal and professional computing, which has also attracted hackers to increase their focus on creating malware and other security vulnerabilities for these devices. A former McAfee researcher " Dmitri Alperovitch " has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user texts and emails. He conducted the experiment on a phone running Android operating system, although he saysApple Inc.'s iPhones are equally vulnerable. Android is particularly vulnerable because it has become the main operating system for mobile devices. Today most smartphones are android-based therefore there is a huge dividend for hackers to write Android-targeted malware compared to other operating systems. Alperovitch, who has consulted with the U.S. intelligence community, is...
Another #FuckFBIFriday , Anonymous hack FBI partner Infragard

Another #FuckFBIFriday , Anonymous hack FBI partner Infragard

Feb 24, 2012
Another #FuckFBIFriday , Anonymous hack FBI partner Infragard As Anonymous has promised that it will attack government, corporate and law enforcement web sites every Friday, So Anonymous has attacked the FBI affiliate Infragard for the second time, this time taking over and defacing the web site of its Dayton, Ohio chapter. Hackers give message " Greetings Pirates! Another #FuckFBIFriday is here and once again we emerge from the hacker underground to wreak havoc upon the 1%'s institutions of repression " . InfraGard is a private non-profit organization serving as a public-private partnership between the U.S. businesses and the FBI. However, Anonymous has its own definition - " the sinister alliance between law enforcement, corporations, and white hat wannabees, " the group wrote in a note it posted onto the homepage of InfraGard Dayton, Ohio. Mirror link of hack is here .
Spain Police under Anonymous attacks after another Arrests in Spain

Spain Police under Anonymous attacks after another Arrests in Spain

Feb 24, 2012
Spain Police under Anonymous attacks after another Arrests in Spain Anonymous attacks Official Site of the National Police ( http://policia.es/ ) after the arrests of suspected Anonymous hacktivists . The Spanish branch of the group has reported that six hacktivists have been arrested in Spain over the past few days. The police did not confirm the identity of the suspects, but claimed the force's technological investigation brigade is conducting a large operation. Anonymous Tweet : " @AnonOps 6 #Anonymous were caught by the police in spain. They're talking about a big anti-hack operation" We know. Expect uspolicia.es DOWN | #Anonymous #Spain " . Last week, Following the arrest of three young Anonymous hackers in Greece, the collective carried out a second assault on the ministry of justice's website, defacing its homepage. Last June Anonymous launched #OpPolicia, a successful DDoS attack against the Spanish National Police website. The attack was a direc...
Metasploit Framework 4.2.0 : IPv6, VMware, and Tons of Modules!

Metasploit Framework 4.2.0 : IPv6, VMware, and Tons of Modules!

Feb 24, 2012
Metasploit Framework 4.2.0 : IPv6, VMware, and Tons of Modules! Since last release in October, Metasploit added 54 new exploits, 66 new auxiliary modules, 43 new post-exploitation modules, and 18 new payloads.  Metasploit 4.2 now ships with thirteen brand new payloads, all added to support opening command sessions and shells on IPv6 networks. In addition, Metasploit’s existing arsenal of payloads has been updated to support IPv6 as well. With this release comes a pile of new modules targeting VMware vSphere/ESX SOAP interface, as well as a pair of new brute force modules to audit password strength for both vmauthd and Virtual Web Services. Metasploit 4.2 now ships with fourteen new resource scripts, nearly all of which were provided by open source community contributors. These scripts demonstrate the power of Metasploit’s extensible architecture, allowing programmatic Metasploit module usage through the powerful Ruby scripting language. Download Metasploit Framework 4.2....
PacketFence 3.2.0 released

PacketFence 3.2.0 released

Feb 24, 2012
PacketFence 3.2.0 released The PacketFence development team has published version 3.2.0 of its open source network access control (NAC) system. PacketFence allows organisations to increase control over their network by enforcing authentication and registration for newly connected devices. It also enables abnormal network activity detection and the isolation of troublesome devices. New features in 3.2.0 OpenVAS Vulnerability Assessment integration for client-side policy compliance Bandwidth violations based on RADIUS accounting information Billing engine integration for allowing the use of a payment gateway to gain network access. PacketFence 3.2.0  fix Reflected Cross-site scripting (XSS) in Web Admin printing system. Further information about the update, including a full list of changes, can be found in the official release announcement and in the change log . PacketFence 3.2.0 Download
Expert Insights Articles Videos
Cybersecurity Resources