#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

WhatsApp Could Offer 'Like' and 'Mark as Unread' Features Soon

WhatsApp Could Offer 'Like' and 'Mark as Unread' Features Soon

Jul 11, 2015
The popular instant messaging app WhatsApp might adopt some features from its parent company, Facebook. The messaging giant is testing some new features that might be coming to the app soon. The features include a 'Like' button similar to that of Facebook and a 'Mark as Unread' feature for chat messages, AndroidPit reports . 'Like' Button for Images Ilhan Pektas, WhatsApp beta tester, recently claimed that a future WhatsApp update will introduce a 'Like' button for images, indicating the company might allow users to Like their friend's profile picture and images shared in groups as well. There aren't many details about the new features yet, but if implemented, Like button feature is something that could improve group chats. 'Mark as Unread' Feature to Chats Besides implementing Like button, WhatsApp is also planning to introduce a 'Mark as Unread' feature to chat messages that will offer recipients abil...
German Missile System Hacked; 'Unexplained' Commands Executed Remotely

German Missile System Hacked; 'Unexplained' Commands Executed Remotely

Jul 11, 2015
Now this is a shockingly dangerous threat when hackers are taking over weapons and missiles. This time I am not talking about weapon systems being hackable, but being HACKED! A German Patriot anti-aircraft missile system stationed on Turkish-Syrian border was reportedly hacked and taken over by an unknown " foreign source " who successfully executed " unexplained commands ." Two Attack Vectors Attacks on the Patriot missiles system were detected when "unexplained" orders were given to the weapons via two supposed weak spots. German trade publication Behörden Spiegel reports that the American-made missile system was accessed either through a Computer Chip that directs weapons guidance or through a Real-Time information exchange that provides communication between arms and commands. The publication speculates that the hackers may have stolen sensitive information and accessed missile control that could result in a missile firing ...
Three Politicians Hacked Using Unsecured Wi-Fi Network

Three Politicians Hacked Using Unsecured Wi-Fi Network

Jul 11, 2015
If you are one of our readers who follow The Hacker News every update, you probably know that Public WiFi network is a security risk. But many people aren't aware, including our great politicians. Internet security provider F-Secure carried out an experimental hack against three prominent UK politicians and hacked into their accounts with the help of public Wi-Fi network. To be very clear, all the three politicians – Rt. Hon. David Davis MP, Mary Honeyball MEP and Lord Strasburger – gave their consent to the recent exercise that focused on hacking into their devices using public, freely available Wi-Fi networks across London. F-Secure teamed up with the penetration testing firm Mandalorian Security Services and the Cyber Security Research Institute to carry out the tests . Despite holding major positions within the different parliaments, all three politicians admitted that they had " received no formal training or information about the relative ease " wi...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
UK to ban WhatsApp, iMessage and Snapchat Under New Laws

UK to ban WhatsApp, iMessage and Snapchat Under New Laws

Jul 11, 2015
If you rely on messaging apps to remain in contact with your family members and friends, then you may have to switch back to old-fashioned text messaging service in matter of weeks due to a new law currently going through Parliament. WhatsApp and Facebook Messenger to Ban in UK The popular messaging applications, including WhatsApp, Snapchat, iMessage and Facebook Messenger, could all potentially be banned in the UK under the controversial ' Snoopers Charter '. The Investigatory Powers Bill -- the so-called Snoopers Charter -- mentioned in the 2015 Queen's Speech , would allow UK government to eradicate instant messaging apps that refuse to switch off end-to-end encryption from their services. Earlier this year in light of the Charlie Hebdo shootings in Paris, Prime Minister David Cameron hinted at the crackdown when he claimed that he would ban encrypted messaging apps like Snapchat, WhatsApp and Messenger unless they didn't comply with new surve...
This Organic Computer is Made up from Brains of Rats and Monkeys

This Organic Computer is Made up from Brains of Rats and Monkeys

Jul 10, 2015
Brains are more powerful than computers. So why not build a computer from Brain?  In fact, Multiple Brains as per sayings, " Two heads are better than one. " Scientists at Duke University have done exactly that. They have successfully developed the first instance of a Brain-machine interface that employs multiple brains at once to operate a single machine. "Organic Computers" – Made from Brains of Rats and Monkeys Scientists were able to interconnect the brains of four rats to create a " Brainet " that is capable of accomplishing computational tasks better than the tasks performed by any one of the rats. In the recent paper published in the journal Scientific Reports, the neurobiologist leading the research, Miguel Nicolelis says: " Recently, we proposed that 'Brainets,' i.e. networks formed by multiple animal brains, cooperating and exchanging information in real time through direct brain-to-brain interfaces, could ...
Critical OpenSSL Flaw Allows Hackers to Impersonate Any Trusted SSL Certificate

Critical OpenSSL Flaw Allows Hackers to Impersonate Any Trusted SSL Certificate

Jul 09, 2015
The mysterious security vulnerability in the widely used OpenSSL code library is neither HeartBleed nor FREAK, but it's critical enough to be patched by sysadmins without any delay. OpenSSL Foundation released the promised patch against a high severity vulnerability in OpenSSL versions 1.0.1n and 1.0.2b, resolving a certificate forgery issue in the implementations of the crypto protocol. The critical vulnerability could allow man-in-the-middle attackers to impersonate cryptographically protected websites, virtual private networks, or e-mail servers, and snoop on encrypted Internet traffic. The vulnerability, ( CVE-2015-1793 ), is due to a problem lies in the certificate verification process. An error in its implementation skipped some security checks on new, untrusted certificates. By exploiting this vulnerability, an attacker could circumvent certificate warnings that enable them to force applications into treating an invalid certificate as a legitimate Certificat...
Hacking Team Flash Zero-Day Linked to Cyber Attacks on South Korea and Japan

Hacking Team Flash Zero-Day Linked to Cyber Attacks on South Korea and Japan

Jul 09, 2015
The corporate data leaked in the recent cyber attack on the infamous surveillance software firm Hacking Team has revealed that the Adobe Flash zero-day (CVE-2015-5119) exploit has already been added to several exploit kits. Security researchers at Trend Micro have discovered evidences of the Adobe Flash zero-day (CVE-2015-5119) exploit being used in a number of exploit kits before the vulnerability was publicly revealed in this week's data breach on the spyware company. The successful exploitation of the zero-day Flash vulnerability could cause a system crash, potentially allowing an attacker to take full control of the affected system. Adobe Flash Zero-Day Targeted Japan and Korea According to the researchers, the zero-day exploit, about which the rest of the world got access on Monday, was apparently used in limited cyber attacks on South Korea and Japan . "In late June, [Trend Micro] learned that a user in Korea was the attempted target of various ...
Micro:bit — A Pocket-sized Programmable Computer

Micro:bit — A Pocket-sized Programmable Computer

Jul 09, 2015
The BBC has unveiled the final design of the Micro:bit — a pocket-sized computer board designed to lure U.K. school children to embedded electronics. The Micro:bit is essentially a codeable computer that lets kids get creative with technology. It measures 5cm by 4cm and will be available in different colors. The idea behind the Micro:bit is to encourage young children to learn how computers work, and to get kids into programming and engineering at the young age. What does this tiny little computer contain? The Micro:bit, made in collaboration with ARM, Barclays, element14, Freescale, Lancaster University, Microsoft, Nordic Semiconductor, Samsung and the Wellcome Trust, contains: A 32-bit ARM Cortex M0 CPU Programmable Array of 25 red LEDs Micro USB port through which it can be powered Three input-output (I/O) Ring Connectors to hook it up to other kits and sensors Bluetooth for connectivity A 3V output connector to power external devices A 20-pin edge...
17-Year-Old Lizard Squad Member Found Guilty Of 50,700 Hacking Charges

17-Year-Old Lizard Squad Member Found Guilty Of 50,700 Hacking Charges

Jul 08, 2015
An alleged member of Lizard Squad, who claimed responsibility for knocking Sony's PlayStation Network and Microsoft's Xbox Live offline late last year has been convicted of 50,700 counts of cyber crime. The infamous computer hacker gang Lizard Squad launched massive Distributed Denial-of-Service (DDoS) attacks against the largest online gaming networks -- PlayStation Network and Xbox Live -- on Dec. 25, 2014. Then offered to sell its own Lizard-branded DDoS-for-hire tool called Lizard Stresser. Julius "zeekill" Kivimaki , a 17-year-old was given a two-year suspended prison sentence and was "ordered to fight against cybercrime," according to Finnish newspaper Kaleva . Facing more than 50,000 Counts of Computer Crime Finnish authorities arrested Kivimaki in late 2014. Under the alias " Ryan ," the teen participated in an interview with U.K. television station Sky News, openly claiming that he is a member of Lizard Squad a...
Zero-Day Flash Player Exploit Disclosed in 'Hacking Team' Data Dump

Zero-Day Flash Player Exploit Disclosed in 'Hacking Team' Data Dump

Jul 07, 2015
The Recent Cyber Attack that exposed 400GB of corporate data belonging to surveillance software firm Hacking Team has revealed that the spyware company have already discovered an exploit for an unpatched zero-day vulnerability in Flash Player. Security researchers at Trend Micro claim that the leaked data stolen from Hacking Team , an Italian company that sells surveillance software to government agencies, contains a number of unpatched and unreported Adobe flaws. Hacking Team has Unpatched Flash Bug  While analyzing the leaked data dump, researchers discovered at least three software exploits – two for Adobe Flash Player and one for Microsoft's Windows kernel. Out of two, one of the Flash Player vulnerabilities, known as Use-after-free vulnerability with CVE-2015-0349 , has already been patched. However, the Hacking Team described the other Flash Player exploit, which is a zero-day exploit with no CVE number yet, as "the most beautiful Flash bug for ...
OpenSSL to Patch Undisclosed High Severity Vulnerability this Thursday

OpenSSL to Patch Undisclosed High Severity Vulnerability this Thursday

Jul 07, 2015
Attention Please! System Administrator and anyone relying on OpenSSL should be prepared to switch to a new version of the open-source crypto library that will be released this Thursday 9th July. OpenSSL is a widely used open-source software library that provides encrypted Internet connections using SSL/TLS for majority of websites, as well as other secure services. The new versions of OpenSSL crypto library, versions 1.0.2d and 1.0.1p , address a single security vulnerability classified as "high severity," the OpenSSL Project Team announced on Monday. There isn't more details about the mystery security vulnerability available yet, except for the fact that the security vulnerability doesn't affect the 1.0.0 or 0.9.8 series. "The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2d and 1.0.1p," developer Mark J Cox announced in a mailing list note published yesterday. "These releases will be ...
'Hacking Team' Gets Hacked! 500GB of Data Dumped Over the Internet

'Hacking Team' Gets Hacked! 500GB of Data Dumped Over the Internet

Jul 06, 2015
Yes, sometimes even the Hackers get Hacked. Hacking Team , one of the most controversial spyware and malware providers to governments and law enforcement agencies all around the world, allegedly been hacked, with some 500 gigabytes of internal data leaked over the Internet . The leaked data indicates that despite its denials, the spyware company did sell powerful spyware tools to oppressive regimes in Sudan, Bahrain, Ethiopia and Saudi Arabia . Massive Data Breach at Hacking Team The unknown hackers not only managed to make 500 GB of client files , financial documents, contracts and internal emails, publicly available for download, but also defaced Hacking Team's own Twitter account, replacing the company's logo to "Hacked Team." Hacking Team , also known as HT S.r.l, is an Italian company known for providing powerful surveillance software Remote Code System (RCS) to Governments and law enforcement agencies. The company previously claimed to o...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>