#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Salesforce Security Handbook

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Wi-Fi Security Challenge 3 By Security Tube, Prize: $50 !

Wi-Fi Security Challenge 3 By Security Tube, Prize: $50 !

May 18, 2011
Wi-Fi Security Challenge 3 By Security Tube, Prize: $50 ! Wi-Fi Security Challenge 3: https://www.securitytube.net/video/1884 This challenge has 2 parts: 3a. Never Judge a Packet by its Type: In this challenge the trace file contains a Shared Key Challenge Text and Encrypted Response. You will need to crack the WEP key with just this. 3b. Never Send a N00b to a do a Hacker's Job: In this challenge, you send your N00b apprentice to collect a Wireshark trace. He mistakenly limits the size of the packets and all your get is a truncated encrypted data packet! :( Can you crack the WEP key with just this? Take a shot! All tools / programming platforms required are present on BT4. We don't expect you to scour the web for this :) Prizes: The first person to finish the challenges and send us an email will win $50 worth of goodies from Amazon. Your choice! choose what you want! You can download the trace files and updates from the Challenge Page: https://www.securitytube.ne...
Android phones vulnerable to hackers !

Android phones vulnerable to hackers !

May 18, 2011
Android phones vulnerable to hackers ! Handsets using Google's operating system can allow hackers to access calendars, contacts and private pictures, they claim. Only the latest phones have had the data leak plugged, meaning 99.7 per cent of Android handsets are vulnerable. 'We wanted to know if it is really possible to launch an impersonation attack against Google services,' the German researchers wrote. 'The short answer is yes, it is possible and it is quite easy to do so. 'The adversary can gain full access to the calendar, contacts information or private web albums of the respective Google user. 'This means that the adversary can view, modify or delete any contacts, calendar events or private pictures.' The research was carried out by a University of Ulm team, who studied how Android dealt with log-ins for web-based services. When a user needs to access Google calendar, contacts and photo apps, an authentication 'token' is retrieved. But the tokens are sent unencrypted in p...
SQLi vulnerability in (IPL) Indian Premier League Found by MaDnI - PCA

SQLi vulnerability in (IPL) Indian Premier League Found by MaDnI - PCA

May 18, 2011
SQLi vulnerability in Indian Premier League Found by MaDnI - PCA MaDnI - PCA found Sql Injection vulnerability in (IPL) Indian Premier League website https://www.iplt20.com .  vulnerability  allow to get whole sql database including Logins details and all.  Proof of Vunl : https://pastebin.com/qBMmmdW0
cyber security

Operationalize Incident Response: Scale Tabletop Exercises with AEV

websiteFiligranIncident Response / Exposure Validation
Learn how to standardize, automate, and scale IR tabletop drills for compliance and team readiness.
cyber security

Humans Are the Ultimate Firewall at SANS Surge 2026

websiteSANS InstituteCybersecurity Training / Certification
Build resilience, sharpen instincts, and train like the human defender threats fear most.
Net pirate monitoring firm hacked !

Net pirate monitoring firm hacked !

May 18, 2011
A firm employed by the French government to track down net pirates has been hacked. Trident Media Guard is believed to have exposed a range of data, including advice on how to avoid detection. TMG monitors peer-to-peer networks as part of France's efforts to find those guilty of copyright infringements. Eric Walter, head of the French anti-piracy unit, confirmed on Twitter that it had "temporarily suspended" links with TMG. France's so-called HADOPI law has caused controversy since it was introduced in 2009. Suspected illegal file-sharers receive three official warnings, after which they are reported to a judge who can hand out a range of punishments, including disconnecting them from the internet. The UK is due to introduce similar legislation, although at this stage it has no plans to punish offenders with disconnection. But it will need to employ a firm similar to TMG. When anti-piracy firms monitor peer-to-peer networks for copyright infringements, they...
Govt militry Engineering services database hacked by MaDnI (PCA)

Govt militry Engineering services database hacked by MaDnI (PCA)

May 18, 2011
Govt militry Engineering services database hacked by MaDnI (PCA) Madni ,member of Pakistan Cyber Army today hack the admin login /password of Govt militry Engineering services at https://www.mes.gov.in/ . Admin login is leaked by him at  https://pastebin.com/AKbci4yH
TinKode Hack FTP of NASA Goddard Space Flight Center !

TinKode Hack FTP of NASA Goddard Space Flight Center !

May 17, 2011
TinKode  Hack FTP of  NASA Goddard Space Flight Center  ! TinKode  Give another big Hack. This time he hack FTP of  NASA Goddard Space Flight Center  at  servir.gsfc.nasa.gov  , Some Months before  European Space Agency (ESA.INT) was also Hacked by TinKode . In Above image you can see the proof of hack.
Metasploit Framework 3.7.1 Released !

Metasploit Framework 3.7.1 Released !

May 17, 2011
Metasploit Framework 3.7.1 Released ! Statistics Metasploit now ships with 687 exploit modules, 357 auxiliary modules, and 39 post modules. 2 new exploits and 2 new auxiliary modules have been added since the last release. Highlights & New Features This release address a performance issue with HTTP Services and adds a few modules. In addition, a bug in the Windows auto-update task has been corrected, along with minor changes to the Windows installer. New Modules VideoLAN VLC ModPlug ReadS3M Stack Buffer Overflow ICONICS WebHMI ActiveX Buffer Overflow SPlayer 3.7 Content-Type Buffer Overflow OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit ARP Spoof Download Metasploit Framework 3.7.1
Microsoft's Bing And Facebook's Like Button Team Up Against Google !

Microsoft's Bing And Facebook's Like Button Team Up Against Google !

May 17, 2011
Microsoft's Bing And Facebook 's Like Button Team Up Against Google ! Microsoft has deepened its ties with Facebook by integrating the platform's social network data with the Bing search engine. Under the new partnership, users will be able to view 'likes' and recommendations made by their friends on the Bing search engine. Microsoft said that Bing will be capable of prioritising the search results based on Facebook 'likes', providing a more personalised search experience to Facebook and Bing users. The famous Facebook 'like' button will appear on the search results. The companies had started integrating Facebook's 'Like' button in February, but the new partnership will allow users to see the recommendations made by complete strangers. "New features make it easier to see what your Facebook friends "like" across the Web, incorporate the collective know-how of the Web into your search results, and begin adding a more conversational aspect to your searches," the c...
Vulnerability in Google ClientLogin Protocol !

Vulnerability in Google ClientLogin Protocol !

May 17, 2011
Vulnerability in Google ClientLogin Protocol ! A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google's ClientLogin protocol. In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that's user for authentication. Bastian Könings, one of the researchers from the group, told SecurityWeek, "The adversary could use this authToken to gain full access to the data API of the specific service and view, modify or delete any contacts, calendar events, and web albums of that user." "The vulnerability isn't limited to Android Google apps, but to any apps and desktop applications that use Google's ClientLogin protocol over HTTP r...
Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers)

Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers)

May 16, 2011
Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers) Few Days Before , Pakistan Cyber Army got hacked by Indian Cyber Army (Indishell) , and Indishell Got whole Database of PCA site. They Explore the stuff and Got the Real Identity of PCA member, who was continuously hacking the thousands of Indian websites and Servers Daily. In Nov, 2010 CBI  was also hacked by some Pakistan hackers. Lets See What Indishell Got from Their Database Dump : 1.) On Private Message PCA admin Shak is asking for 8000 PKR to Teach Hacking Course (ECH). His Name and Bank details are below -- Name : Bilal Yaqoob Place:- Karachi, Sindhi Country :- Pakistan His Bank or what ever the payment details here are they ID card Number : 35202-1555072-9 PayMent GateWay :- easy paise Mobile number :-03324681620 (U PHONE) Studying in punjab university 2.) Adil, Member of PCA team was arrested (according to Pakistan Govt) ,in case of Cyber attack on Pakistan P...
#OpEverest : Anonymous make Central website of the Nepal Government Down

#OpEverest : Anonymous make Central website of the Nepal Government Down

May 16, 2011
#OpEverest :  Anonymous make Central website of the Nepal Government Down Anonymous have new #OpEverest Against Nepal Government . The open letter to Govt of Nepal from Anonymous is as shown. Nepal Government website is down because of DDos attack ! Link : https://www.nepalgov.gov.np/ They have define next some targets also : * https://www.ucpnm.org/ * https://www.nepalicongress.org/ * https://www.cpnuml.org/ * https://www.mjfn.org/ Stay Tuned for Updates :)
Fake antivirus campaign on India’s DNA e-newspaper website !

Fake antivirus campaign on India's DNA e-newspaper website !

May 16, 2011
Fake antivirus campaign on India's DNA e-newspaper website ! DNA (Daily News and Analysis) is an Indian daily English language newspaper. According to Wikipedia, DNA ranks 8th among the top ten English dailies in India. Recently, the Zscaler solution was blocking access to this site, as it contained malicious content. Here is the homepage of this website: The 'Today's E-newspaper' link (circled above) is an online version of the printed periodical. We discovered that one of the pages from this e-newspaper site was infected with malicious script. Here is the screenshot of that page: The malicious script tag had been inserted in plain text as can be seen in this screenshot of page source: The malicious script tag directs the victim's browser to 'hxxp://vcvsta.com/ur.php'. This page then redirects the user to another malicious site ('hxxp://www4.to-gysave.byinter.net,), which will again redirect victim to random sites hosting fake antivirus campaigns. Here is the screenshot disp...
QuickRecon v0.3 version released !

QuickRecon v0.3 version released !

May 16, 2011
QuickRecon v0.3 version released ! QuickRecon is a simple information gathering tool that allows you to: find subdomain names, perform zone transfer, gather emails and find human relationships using microformats. It is a simple information gathering utility based on Qt4 toolkit. Download QuickRecon v0.3 here
Expert Insights Articles Videos
Cybersecurity Resources