#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

VeriSign demands Power to takedown non-legitimate website

VeriSign demands Power to takedown non-legitimate website

Oct 11, 2011
VeriSign demands Power to takedown non-legitimate website VeriSign, which manages the database of all .com internet addresses, wants powers to shut down "non-legitimate" domain names when asked to by law enforcement. VeriSign should be able to shut down a .com or .net domain, and therefore its associated website and email, " to comply with any applicable court orders, laws, government rules or requirements, requests of law enforcement or other governmental or quasi-governmental agency, or any dispute resolution process ", according to a document it filed today with domain name industry overseer ICANN. The new powers would be international and, according to VeriSign's filing, could enable it to shut down a domain also when it receives " requests from law enforcement ", without a court order." Various law enforcement personnel, around the globe, have asked us to mitigate domain name abuse, and have validated our approach to rapid suspension of...
German Researchers Break RFID Smartcard Encryption

German Researchers Break RFID Smartcard Encryption

Oct 11, 2011
German Researchers Break RFID Smartcard Encryption Scientists have found a way to circumvent the encryption used to protect a smartcard used to restrict access to buildings and to process public transit system payments. A team of German scientists have demonstrated a hack that lets them make a perfect clone of the kind of magnetic security card used to give access to workers in corporate or government buildings -- including NASA -- and as a daily ticket replacement on buses and subways. The same team broke a previous version of contactless-ID cards from Mifare in 2008.  This prompted the company to upgrade its security to create a card able to be programmed only once and which contained a unique identifying number that could be checked against the programmed content on the card for extra security. The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeat...
FBI shut down 18 Child Porn Websites

FBI shut down 18 Child Porn Websites

Oct 11, 2011
FBI shut down 18 Child Porn Websites A man was recently indicted on federal charges of running 18 Chinese-language child pornography websites out of his apartment in Flushing, New York. The websites were being advertised to Chinese-speaking individuals in China, in the U.S., and other countries. According to the FBI, " Virtually every day, children are lured away from their families by cyber sexual predators. We're committed to stopping these crimes through our Innocent Images National Initiative. Based in Maryland, it joins FBI agents and local police in proactive task forces around the country that work online undercover to stop those who prey on our kids. " In late 2010, the FBI - through their legal attaché office in Beijing - received information from Chinese officials about their investigation of a large-scale child pornography website housed on U.S. servers. One of their main suspects, a Chinese-born man, was living in New York. The FBI's New York office op...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
OWASP Mantra - c0c0n 11 and AppSecLatam 11 Release

OWASP Mantra - c0c0n 11 and AppSecLatam 11 Release

Oct 11, 2011
OWASP Mantra - c0c0n 11 and AppSecLatam 11 Release  The third beta of OWASP Mantra Security Toolkit has been released. One of the main features of this version is the multi-language support. Mantra now supports Hindi and Spanish, in addition to English. If you can give us a helping hand by translating Mantra into more languages, feel free to contact us and we will look forward to see you in Team Mantra. This version is based on Firefox 7.0.1 and comes with some new extensions which you will definitely find useful. One of the other changes is renaming the "Ayudha" menu back to "Tools". We all are comfortable with "Tools" and we decided to keep it intact. This is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers, security professionals, etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software. Mantra...
111 Arrested for biggest identity theft and credit card fraud Case

111 Arrested for biggest identity theft and credit card fraud Case

Oct 10, 2011
111 Arrested for biggest identity theft and credit card fraud Case One of the biggest identity theft and credit card fraud cases in history has generated millions of dollars in losses to date. 111 individuals have been indicted in the largest identity theft takedown in U.S. history. " This is by far the largest--and certainly among the most sophisticated--identity theft/credit card fraud cases that law enforcement has come across ," said Richard A. Brown, the district attorney of Queens, N.Y., in a statement announcing the arrests. The defendants, members of five organized forged credit card and identity theft rings based in Queens County and having ties to Europe, Asia, Africa and the Middle East, are charged in ten indictments with stealing the personal credit information of thousands of unwitting American and European consumers and costing these individuals, financial institutions and retail businesses more than $13 million in losses over a 16-month period. As part...
U.S. drones affected by Keylogger Virus

U.S. drones affected by Keylogger Virus

Oct 10, 2011
U.S. drones affected by Keylogger Virus A keylogger of some sort has infiltrated classified and unclassified computer systems at Creech Air Force Base in Nevada, recording the keystrokes of pilots tasked with operating unmanned drone aircraft in Afghanistan and other international conflict zones. The virus, first detected nearly two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech's computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military's most important weapons system. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft said, " We generally do...
SWSE - Most advanced Wi-Fi Hacking and Security Course online

SWSE - Most advanced Wi-Fi Hacking and Security Course online

Oct 10, 2011
SWSE - Most Advanced Wi-Fi Hacking and Security Course online We covered the launch of the SecurityTube Wi-Fi Security Expert in a previous article. As their entire courseware is available online free of charge to evaluate: , I took a look over the weekend and I was very impressed. The instructor assumes you are an absolute n00b to the subject and starts from the very basics of how to get started with creating your own lab for doing Wireless Hacking exercises. He then slowly gains momentum and touches upon a ton of topics - Honeypots, Hotspot attacks, MITM over wireless, WEP/WPA/WPA2 Cracking, WPA/WPA2-Enterprise hacking, PEAP, EAP-TLS, EAP-TTLS cracking, creating backdoors with wireless, Wi-Fi malware etc. All of this is covered in over 12+ hours of HD videos. I would strongly recommend you to download the full courseware here and see for yourself: https://securitytube.net/downloads If you are interested in using this for your job and desire to get a certification then, Security...
[Call for Article] The Hacker News Magazine - November 2011 Edition

[Call for Article] The Hacker News Magazine - November 2011 Edition

Oct 09, 2011
[ Call for Article ] The Hacker News Magazine - November 2011 Edition The Hacker News is starting to prepare the next issue of ' The Hacker News Magazine '. Submissions are invited for a 6th up coming special November Issue as " Anniversary Edition ". If you have something interesting to write, please drop us an email at : thehackernews@gmail.com Yes ! We are going to Celebrate ' The Hacker News '  1st Anniversary on 1 November, 2011 . Each Issue/Article of our Magazine and Website aims to spread Awareness and Knowledge about Cyber Security. We gather articles from young minds that deal closely with the topic of Security and Hacking Threats. Topics of interest include, but are not limited to the following: - New Attack and Defense Techniques - Vulnerability discovery - Small Tactics & Techniques - Big Attacks & Impact - Mobile Hacking - Professional Exploit Development - Security and Hacking Events Around The World ...
Optima DDOS 10a Botnet leaked on Underground Forums

Optima DDOS 10a Botnet leaked on Underground Forums

Oct 08, 2011
Optima DDOS 10a botnet leaked on Underground Forums On underground forums " Optima DDOS 10a Botnet " full version posted for all to download and use. Complete new version of the acclaimed DDoS bot Optima Darkness. In this new version 10a according to the author was raised in secrecy bot system and optimized grabber passwords. It cost about $ 600 worth. Features a bot: DDoS attacks of three types - http flood, icmp-flood, syn-flood. Theft of stored passwords from some applications installed on the victim's system, details below. Opening on the infected system proxy Socks5. The possibility of cheating various counters on the websites (http-access the sites). Hidden download and run the specified file to the affected systems. Installed in the system as a service Weight bot - 95.5 kb, written in Delphi. At the moment the following antivirus detected: [ Source ]
Apache Patch released for Reverse proxy Bypass Vulnerability

Apache Patch released for Reverse proxy Bypass Vulnerability

Oct 08, 2011
Apache Patch released for  Reverse proxy Bypass Vulnerability Security experts at Context have discovered a hole in the Apache web server that allows remote attackers to access internal servers. Security experts are warning firms running the Apache web server to keep up to date with the latest patches after the Apache Software Foundation issued a security advisory to all customers highlighting a new vulnerability. The weakness in 1.3 and all 2.x versions of the Apache HTTP Server can be exploited only under certain conditions. Reverse proxies are used to route external HTTP and HTTPS web requests to one of several internal web servers to access data and resources. Typical applications include load balancing, separating static from dynamic content, or to present a single interface to a number of different web servers at different paths. Context explained that the attack is based on an Apache web server using the mod_rewrite proxy function, and uses a common hacking...
Android malware - Works on remote commands form encrypted blog

Android malware - Works on remote commands form encrypted blog

Oct 08, 2011
Android malware - Works on remote commands form encrypted blog Researchers from Trend Micro have spotted a piece of malicious software for Android. This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected device. Trend Micro calls the malware " ANDROIDOS_ANSERVER.A. " If the application is installed, it asks for a variety of permissions. If those are granted, it can then make calls, read log files, write and receive SMSes and access the Internet and network settings, among other functions. This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. " This is a blog site with encrypted content, which based on our research, is the first time Android malware implemented this kind of technique to communicate, " wrote Karl Dominguez, a Trend Micro threat resp...
Microsoft FUSE Labs Sub-domain defaced by Hmei7

Microsoft FUSE Labs Sub-domain defaced by Hmei7

Oct 08, 2011
Microsoft FUSE Labs Sub-domain defaced by Hmei7 Hacker named " Hmei7 " defaced the official sud-domain of Microsoft FUSE Labs ( https://fuse.microsoft.com/ ) as shown above. He wrote a taunt on the home page with signature " are you microsoft?? , hackedby Hmei7 ". Mirror of hack at Zone-H is here .
Suzuki Official Website of Azerbaijan hacked by Co-cain Tm

Suzuki Official Website of Azerbaijan hacked by Co-cain Tm

Oct 08, 2011
Suzuki Official Website of Azerbaijan hacked by Co-cain Tm Suzuki Official Website of Azerbaijan today defaced by Co-cain Tm Hackers. The home page contain following lines: Cg 125 For Ever ! Co-cain Tm Sp Tnx 2 Skitt3r The Mirror of this hack also available on Zone-H . Reason of hack is unknown, supposed to be just for fun.
Expert Insights Articles Videos
Cybersecurity Resources
//]]>