#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

This iPhone Malware infecting Jailbroken Devices Stole 225,000 Apple Accounts

This iPhone Malware infecting Jailbroken Devices Stole 225,000 Apple Accounts

Aug 27, 2015
Jailbreakers Beware! Some shady tweaks that you installed on their jailbroken devices are looking to steal your iCloud login credentials, a report said. The iCloud account details, including email addresses and passwords, of nearly 220,000 jailbreak users have been breached , an online Chinese vulnerability-reporting platform WooYun reported . WooYun is an information security platform where researchers report vulnerabilities and vendors give their feedbacks. Backdoor Privacy Attack The security breach, according to the website, was a result of ' backdoor privacy attack ' caused by the installation of a malicious jailbreak tweak. It appears that Hackers are using a variety of " built-in backdoors " that could be numerous of malicious jailbreak tweaks in an effort to acquire victim's iCloud account information. Once installed, these malicious tweaks transferred the iCloud login details of the jailbreak users to an unknown remote se...
Here’s the List of Top 10 Big Tech Companies where Ashley Madison is very Popular

Here's the List of Top 10 Big Tech Companies where Ashley Madison is very Popular

Aug 26, 2015
Cheaters Exposed! Would it be  the Impact Team or a woman ex-employee who worked for Avid Life Media (as per John McAfee claims ), the hackers that breached the cheater's dating website Ashley Madison has made the world aware of a lot of unfaithful people. The data crunching firm Dadaviz has analysed the leaked information of the Ashley Madison website and  revealed that thousands of the cheating website customers are from the large tech companies. Among those large tech companies, IBM and HP have the highest number of employees using the online infidelity website. Also, the list included Cisco, Apple, Intel and Microsoft employees. Top 10 Big Tech Companies that Love to Cheat Here is the list of Top 10 Big Tech Companies where Ashley Madison is the most popular: IBM HP Cisco Apple Intel Microsoft Samsung SAP Oracle Qualcomm Dadaviz found that one-third (34 percent) of all the Ashley Madison accounts were fake. Of course, there wou...
Microsoft Office 2016 for Windows coming on September 22

Microsoft Office 2016 for Windows coming on September 22

Aug 26, 2015
Earlier this year, Microsoft had announced to bring its Office 2016 soon to the world. Also, Office 2016 software version for Mac was released in July 2015. Now speculations gearing up are hinting towards a final release date of Office 2016 for Windows as 22nd September 2015. Though, for Window users it may not be quite a change, because in the new Office suite as compared to its predecessor Office 2013 no such major improvements are visible. Office 2016 for Windows is supposedly debuting in less than a month away and will be available for home and professional users initially. Improvements in Office 2016 Office 2016 is going to be more colorful, with bright and dark colored theme options. Also, this time Microsoft has made it pretty clear that people are required to have Office 365 subscriptions because this time Microsoft is going to send new updates of Office along with the updates of Office 365. Mostly, modifications are done in the Outlook applicat...
cyber security

How to remove Otter AI from your Org

websiteNudge SecurityArtificial Intelligence / SaaS Security
AI notetakers like Otter AI spread fast and introduce a slew of data privacy risks. Learn how to find and remove viral notetakers.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneUnified Security / Endpoint Protection
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
iOS Sandbox Vulnerability Puts Enterprise Data at Risk

iOS Sandbox Vulnerability Puts Enterprise Data at Risk

Aug 26, 2015
" Change is the only constant thing ," as it is known could be now modified as " Change is the only constant thing* ," where the * means Terms and conditions apply ! A change ( Mobile Device Management solutions-MDM , Bring Your Own Device-BYOD ) was brought to the organizations, (which later became necessities) for smooth workflow and management of an organization; where resides mobile and other computing devices in masses. The devices, as well as the MDM solutions, are at risk , as reported. Security researchers at Appthority Mobile Threat Team, have found a vulnerability in the sandbox app within the Apple's iOS versions prior to 8.4.1, which makes the configuration settings of managed applications to be openly accessed by anyone. QuickSand – Loophole in Sandbox The vulnerability is assigned CVE-2015-5749 and is named as ' QuickSand ' because of the loophole being present in the Sandbox. Mobile Device Management (MDM) refe...
GitHub Again Hit by DDoS Cyberattack

GitHub Again Hit by DDoS Cyberattack

Aug 26, 2015
Github – the popular code sharing website used by programmers to collaborate on software development – again became a victim of a distributed-denial-of-service (DDoS) attack on Tuesday morning. The attack came just a few months after the popular code repository website GitHub suffered a massive DDoS attack, which was linked to China. Also Read: China Using A Powerful 'Great Cannon' Weapon to Censor The Internet The company was made aware of the issue early on Tuesday. After investigating the problem, the team discovered that the service was under a new DDoS attack. The code repository disclosed the new attack on its status page as well as its official Twitter account. "The connectivity problems have been identified as a DDoS attack. We're working to mitigate now," GitHub status log read early on Tuesday. The March DDoS attack against GitHub lasted close to a week . At the time, the attackers used malicious JavaScript to hijack Internet...
Ashley Madison Hacker – An Insider Woman Employee?

Ashley Madison Hacker – An Insider Woman Employee?

Aug 26, 2015
"Ashley Madison was not hacked!" This is what declared by John McAfee , former founder of antivirus software company McAfee. So far everyone must be aware of Ashley Madison massive data breach. Last week, the hackers, who called themselves Impact Team, posted 10GB of personal data for tens of Millions of its customers, including their names and email addresses. Frequently followed by another leak, where hackers released another 20GB of company's internal data , including personal emails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman, along with the source code for its website and mobile apps. John McAfee: Ashley Madison is an Inside Job by a Woman However, in a post published in the International Business Times, McAfee made a controversial statement saying, " Ashley Madison was not hacked ," and claiming that the alleged data breach was " an inside job ." McAfee says Ashley Madison data was plunde...
Popular Download Service μTorrent wants you to pay for its Software

Popular Download Service μTorrent wants you to pay for its Software

Aug 25, 2015
Just to enhance the services being rendered. The popular peer-to-peer file sharing software application is aiming to achieve new heights by making their software be a paid scheme . uTorrent is one of the clients of BitTorrent Inc. (the parent company) which implements a BitTorrent protocol. Where each client is capable of creating, publishing, and transmitting any computer file over a network, using the protocol. μTorrent is a free piece of software and to support it, the company uses bundled software to offset the cost that would "otherwise be paid directly by the user." "This is a familiar revenue model that is commonly used by software companies," the μTorrent team wrote. "It allows us to fund the costs associated with software development, as well as other projects and innovations." However, the team says it's never satisfied with this revenue model approach , as it requires compromises and reduces a premium user experience, ...
Two Arrested For Dropping Drugs And Porn Into Prison Using A Drone

Two Arrested For Dropping Drugs And Porn Into Prison Using A Drone

Aug 25, 2015
The use of Unmanned Aerial Vehicles (UAVs), popularly known as Drones, is rapidly transforming the way crimes are conducted, and this story helps prove this right. Maryland State Police arrested two men  –  Thaddeus Shortz and Keith Brian Russell  –   suspected of allegedly trying to smuggle drugs and porn into a state prison using a drone , according to law enforcement authorities. The men, with the intention to fly a Yuneec Typhoon drone into local jails, were arrested near the Western Correctional Institution and the North Branch Correctional Institution in Cumberland, Maryland late Saturday. The authorities seized: A Yuneec Typhoon drone , which retails for around $1,300 Synthetic marijuana (also known as " Spice ") Pornographic DVDs Tobacco Prescription drugs A mobile phone A loaded pistol However, the pistol likely was not going to be carried by the drone as it was apparently too heavy that it probably would have weighed down ...
New Android Smartphones will Come with Fewer Pre-installed Apps

New Android Smartphones will Come with Fewer Pre-installed Apps

Aug 25, 2015
A sigh of relief indeed! Google is finally listening to us; it is ditching its haunting bloatware from the upcoming Android smartphones and tablets. As per the current situation, our Android devices are attacked with Google's suite of apps like Google Play Games, Google Newsstand, Google Play Books. The new Samsung Galaxy Note 5 is expected not to be pre-occupied with Google+. Though Android is an open source platform where a user can only give their inputs, the final call is taken by Google; writes and updates Android itself. We can get our own copy from the Android Open Source Project (AOSP) repository. For this, Google has listed thorough instructions to help you build it into a fully functioning version of Android. No Space for Unwanted Apps The phone manufacturers are also given access to the Android source code for free exactly in the same way as users. They can modify and change any parts they like. However, when it comes to installing G...
Hack Leads to Extortions and Suicides! Ashley Madison puts $500,000 Bounty on Hackers' Head

Hack Leads to Extortions and Suicides! Ashley Madison puts $500,000 Bounty on Hackers' Head

Aug 25, 2015
It's been a rough week for cheating website Ashley Madison, whose slogan is " Life is short, have an affair ." Last week, the Impact Team, who claimed to hack Ashley Madison, posted 10GB of personal data for tens of Millions of its customers, including their names and email addresses. The hackers made things even worse by releasing another 20GB of company's internal data , including personal emails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman , along with the source code for Ashley Madison's website and mobile apps. However, regardless of how you respond to the Ashley Madison hack , the bottom line is that what the hackers, who called themselves The Impact Team, did was highly illegal. Not just illegal, but now the Ashley Madison hack has become a reason for suicides, blackmail and multiple cases of extortion. "Two unconfirmed reports of suicides due to #AshleyMadisonHack, says Acting Staff Superintendent Bry...
Microsoft Launches Cortana App For Android Users

Microsoft Launches Cortana App For Android Users

Aug 25, 2015
Yes, she is here! Android users can now talk to Cortana – the first personal digital assistant – which is a patented product of Microsoft. She is available on all the devices running Windows 10 . Earlier in May, Microsoft said they will make Cortana available for Android and iOS users . Therefore, a beta version of Cortana has been rolled out by Microsoft for public. Yesterday, Microsoft made an announcement stating the availability of Cortana for the rival Android platform. This will enable the Android phone users to replace the Google Now shortcut by pressing and holding the home button in order to activate Cortana instead. Microsoft is Opening and Spreading its Wings Everywhere Cortana maintains the same user interface and functionalities as it has in Windows devices. Now the users will get choices between whom to choose, Cortana vs. Google Now . People might like the change, as Cortana is largely appreciated by Windows users. As it is the beta relea...
Girl Hacker Devises a 3D Printed High-Heeled Shoes with Hacking Tools Inside

Girl Hacker Devises a 3D Printed High-Heeled Shoes with Hacking Tools Inside

Aug 25, 2015
Next time when you came across a lady wearing high heels, you need to Watch her steps, and yours too. What if a computer hacker with stunning good look and charm, especially a girl, walk around you? This is the only reason why a young woman hacker going under the name SexyCyborg could turn out so dangerous . SexyCyborg, a Chinese hardware hacker, is actually a very intelligent and extremely geeky woman, who has a keen interest in electronics, robotics, and most importantly 3D printing. She proved this by first creating the Hikaru Skirt   with the help of a 3D printer back in July, and now… …by devising a new way of Hiding Hi-Tech Hacking Technology in a Unique Pair of High-Heeled Shoes . 'Wu Ying Shoes' – A Set of Hacking Tools! She used a 3D-printed pair of high heels for the purpose of hiding a penetration-testing toolkit around. The 3D-printed heels, she dubbed " Wu Ying Shoes ," named after the Chinese folk hero Wong Fei Hung's...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>