#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

4.9 million Tricare patients data exposed in data breach

4.9 million Tricare patients data exposed in data breach

Sep 30, 2011
4.9 million Tricare patients data exposed in data breach About 4.9 million patients treated in San Antonio area military treatment facilities since 1992 have been affected by a health information breach involving the theft of backup tapes for electronic health records, federal officials say. Some of the information included Social Security numbers, addresses, phone numbers and private health information for patients in 10 states. A statement posted on the Defense Department's Tricare health system website said no credit card or bank account information was on the backup tapes. " There is no indication that the data has been accessed by unauthorized persons ," the SAIC spokesman says. SAIC is working with the local police department, Defense Criminal Investigative Services and a private investigator to attempt to recover the tapes, the spokesman adds. TRICARE " does not have a policy " on encryption of backup tapes, a TRICARE spokesman says. SAIC did not i...
Security Solutions for Beast attack against SSL/TLS Vulnerability

Security Solutions for Beast attack against SSL/TLS Vulnerability

Sep 30, 2011
Security Solutions for Beast attack against SSL/TLS Vulnerability Juliano Rizzo and Thai Duong presented a new attack on Transport Layer Security (TLS) at the Ekoparty security conference in Buenos Aires, Argentina. The researchers found that encryption, which should protect us, when we connect to some sites over HTTPS, may be compromised. The researchers say that their code is called BEAST (Browser Exploit Against SSL / TLS) prove to the world that any cryptographic protocol designed to TLS 1.1, is vulnerable and can be quite easily deciphered. Researchers try to decode the authentication cookies used to login to your account PayPal, within 10 minutes, far faster than anyone expected. If successful, the faith of Internet users in one of the pillars of online safety is fully dissipated.BEAST is different from the many published attacks against HTTPS, - said Dwan. - While other attacks are focused on property, authenticity SSL, BEAST Attacks privacy protocol. As far as we know, BE...
JonDo 00.16.001 Released - Automatic error recognition and easier usability

JonDo 00.16.001 Released - Automatic error recognition and easier usability

Sep 30, 2011
JonDo 00.16.001 Released - Automatic error recognition and easier usability JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers. What is JonDo? JonDo is an open source and free-of-charge program for Windows, Linux and MacOS X. It hides the user's IP adress behind an anonymous IP address. In contrast to other anonymizers (VPNs, anonymous proxy servers), the user's anonymity stays protected even against the providers (operators) of the anonymous IP address. What is new? Statistics and support requests about the usage of JonDo let assume that several users of older versions do not use the software correctly, and may thereby surf the net unsecured. The current version warns the user in such a case and launches an assistant for fixing the problem if necessary. Of course, users may also consult the extensive online help for this purpo...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Atlanta IT Worker Hacked Ex-Employers Database

Atlanta IT Worker Hacked Ex-Employers Database

Sep 29, 2011
Atlanta IT Worker Hacked Ex-Employers Database An Atlanta man could receive up to five years in prison after pleading guilty Wednesday to hacking into a former employer's patient database, stealing information and then wiping the database clean. Federal prosecutors said Eric McNeal, 37, used the patient information from a firm identified as " A.P.A ." for a direct marketing campaign at his new employer in the same building. McNeal was an information technology specialist for the perinatal medical practice in Atlanta in November 2009 when he left to join the competing perinatal practice. McNeal used his home computer to hack into his former employer in April 2010, prosecutors said in a release.He downloaded patients' names, addresses and telephone numbers and then cleared his former employer's database, deleting all patient information from its system, prosecutors said. While he used the information for a direct-mail marketing campaign for the benefit of his new employ...
"SecurityTube Wi-Fi Security Expert" (SWSE) online certification Launched

"SecurityTube Wi-Fi Security Expert" (SWSE) online certification Launched

Sep 29, 2011
"SecurityTube Wi-Fi Security Expert" (SWSE) online certification Launched SecurityTube released their first fully online certification today - " SecurityTube Wi-Fi Security Expert " (SWSE) .  The most interesting thing and key difference from other certifications, is that they are giving out the entire course material free of charge! You only pay if you need the certification. If you are a hobbyist or a causal security enthusiast, the course material is free for you :) The SWSE is based on the Wi-Fi Security Megaprimer which we posted about a while back: https://www.securitytube.net/downloads Full details of the certification is available here: https://www.securitytube.net/certifications For an introductory price of $200 till October 15th, 2011 (only limited seats), they are providing all of the following: - Lifetime access to the Students Portal - Lifetime access to Bi-Monthly Webinars with Full Course Coverage and Live Doubt Clearing sessions - Lifetime...
Firefox Java update ready to stop BEAST attacks

Firefox Java update ready to stop BEAST attacks

Sep 29, 2011
Firefox Java update ready to stop BEAST attacks Firefox developers searching for a way to protect users against a new attack that decrypts sensitive web traffic are seriously considering an update that stops the open-source browser from working with Oracle's Java software framework. Johnath, the alias for Firefox Director of Engineering Johnathan Nightingale, weighed in: " Yeah - this is a hard call. Killing Java means disabling user functionality like facebook video chat, as well as various java-based corporate apps (I feel like Citrix uses Java, for instance?) " He went on to say that Firefox already has a mechanism for " soft-blocking " Java that allows users to re-enable the plugin from the browser's addons manager or in response to a dialogue box that appears in certain cases. " Click to play or domain-specific whitelisting will provide some measure of benefit, but I suspect that enough users will whitelist, e.g., facebook that even with those mechanisms (which don...
Supreme Court of Pakistan website defaced by Zombie_Ksa

Supreme Court of Pakistan website defaced by Zombie_Ksa

Sep 28, 2011
Supreme Court of Pakistan website defaced by Zombie_Ksa The official website of Pakistan's Supreme Court has been hacked.Visitors to the website found derogatory and abusive remarks about the court and Chief Justice Iftikhar Muhammad Chaudhry. Earlier the Supreme Court website was hacked by two boys also in the month of September last year to whom the court had granted bail on April 11 as they were less than 18 years of age. The hacker declared that his intent to deface the site was ideological in nature to send a message to the Chief Justice of Pakistan Iftikhar Muhammad Chaudhry: " I am here to request you to go out and help the poor, needy and hungry. They don't have money to eat one-time meal, they don't have clothes to wear, and they don't have accommodation … sitting in your royal chair won't make any changes to our Pakistan. ". According to the press release and independent website Zone-H, Zombie_Ksa had carried out at least 169 defacements, of which 69 were single I...
Man-in-the-Middle Remote Attack on Diebold Touch-screen Voting Machine

Man-in-the-Middle Remote Attack on Diebold Touch-screen Voting Machine

Sep 28, 2011
Man-in-the-Middle Remote Attack on Diebold Touch-screen Voting Machine The Vulnerability Assessment Team (VAT) at the U.S. Dept. of Energy's Argonne National Laboratory in Illinois has managed to hack a Diebold Accuvote touch-screen voting machine. Voting machines used by as many as a quarter of American voters heading to the polls in 2012 can be hacked with just $10.50 in parts and an 8th grade science education, according to computer science. " This is a national security issue ," VAT team leader Roger Johnston told me, echoing what I've been reporting other computer scientists and security experts telling me for years. " It should really be handled by the Department of Homeland Security. " " The level of sophistication it took to develop the circuit board" used in the attack "was that of basically an 8th grade science shop ," says Argonne's John Warner. " Anybody with an electronics workbench could put this together. ...
Department of Homeland Security Releases Cyber Security Evaluation Tool (CSET)

Department of Homeland Security Releases Cyber Security Evaluation Tool (CSET)

Sep 28, 2011
Department of Homeland Security Releases Cyber Security Evaluation Tool (CSET) The Cyber Security Evaluation Tool (CSET) is a Department of Homeland Security (DHS) product that assists organizations in protecting their key national cyber assets. It was developed under the direction of the DHS National Cyber Security Division (NCSD) by cybersecurity experts and with assistance from the National Institute of Standards and Technology. This tool provides users with a systematic and repeatable approach for assessing the security posture of their cyber systems and networks. It includes both high-level and detailed questions related to all industrial control and IT systems. The tool is available for download, and the program also offers training and support at no cost to organizations engaged in administering networks that control facilities identified as being crucial to both the nation's economy and national security. CSET is a desktop software tool that guides users through a step...
Anonymous releases 25,000 records of the Austrian police

Anonymous releases 25,000 records of the Austrian police

Sep 28, 2011
Anonymous releases 25,000 records of the Austrian police Anonymous Austria post via the official Twitter account about 25,000 records Austrian police officers. Observers suspect that the data from the Austrian section of the " International Police Association " could come. Meanwhile, the far-right Freedom Party tries to take advantage of the data leak. " This violation of the privacy of our policemen have become fair game for possible revenge attacks by criminals. Minister Mikl-Leitner, the political responsibility for this incredible gap in the IT system of their ministry and is increasingly becoming a security risk for our country ," criticizes FPÖ Speak Königsberg.
The Council on Governmental Ethics Laws (COGEL) hacked and complete database dumped

The Council on Governmental Ethics Laws (COGEL) hacked and complete database dumped

Sep 27, 2011
The Council on Governmental Ethics Laws (COGEL) hacked and complete database dumped Hacker With Name snc0pe claim to hack official website of The Council on Governmental Ethics Laws (COGEL) . He post a message on pastebin , along with the database download link  (1.88MB).
Anonymous Hackers Release alleged pepper spray NYPD Officer's Personal Info

Anonymous Hackers Release alleged pepper spray NYPD Officer's Personal Info

Sep 27, 2011
Anonymous Hackers Release alleged pepper spray  NYPD Officer 's Personal Info The Anonymous activist collective today released personal information  about a New York police officer who is believed to have sprayed pepper spray on women protesters on Wall Street. The group released phone number, addresses, names of relative and other personal data for a New York police officer, as well as photos that appear to show him at the protest and a closeup of his badge. The Occupy Wall Street organizers also called for the resignation of Police Commissioner Raymond Kelly and released additional video from the incident on the protest Web site . In a statement, Anonymous said: " As we watched your officers kettle innocent women, we observed you barberically (sic) pepper spray wildly into the group of kettled women. We were shocked and disgusted by your behavior. You know who the innocent women were, now they will have the chance to know who you are. Before you commit atroci...
iScanner - Tool to detect and remove malicious codes and web page

iScanner - Tool to detect and remove malicious codes and web page

Sep 27, 2011
iScanner - Tool to detect and remove malicious codes and web page iScanner is a free open source tool lets you detect and remove malicious codes and web page malwares from your website easily and automatically. iScanner will not only show you the infected files in your server but it's also able to clean these files by removing the malware code ONLY from the infected files. Current Features: Ability to scan one file, directory or remote web page / website. Detect and remove website malwares and malicious code in web pages. This include hidden iframe tags, javascript, vbscript, activex objects, suspicious PHP codes and some known malwares. Extensive log shows the infected files and the malicious code. Support for sending email reports. Ability to clean the infected web pages automatically. Easy backup and restore system for the infected files. Simple and editable signature based database. You can easily send malicious file to iScanner developers for analyzes. Ability to u...
Expert Insights Articles Videos
Cybersecurity Resources