#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Salesforce Security Handbook

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Miley Cyrus Needs A Lecture on Cyber Security

Miley Cyrus Needs A Lecture on Cyber Security

Oct 17, 2011
Miley Cyrus Needs A Lecture on Cyber Security The man, who is currently facing up to 121 years behind bars, has been charged with 26 counts of identity theft , wire-tapping and unauthorised access to protected computer.Chaney, who has been in contact with TMZ for the last two years, has contacted the gossip website with details on how he hacked into Miley Cyrus's Gmail account. With celebrity phone hacker Christopher Chaney arrested, another hacker has reached out to TMZ to share how laughably easy it was for him to hack into Miley Cyrus' Gmail account. Here's a lesson in the Internet, Miley: Don't use the name of your best friend (which the Internet knows) as your security question.First he tracked down her Gmail name; though he doesn't say what it is, I just did a quick Google search and came up with two possibilities through Yahoo! Answers already. Obviously that part won't take long. When he tried to log in, he got a security question—the name of one of Miley's girlfriends...
Sesame Street YouTube Channel Hacked, Porn Posted

Sesame Street YouTube Channel Hacked, Porn Posted

Oct 17, 2011
Sesame Street YouTube Channel Hacked, Porn Posted On Sunday afternoon, some of the world's worst lowlifes decided to hack the Sesame Street YouTube channel and replace some of the videos with pornographic clips. For about 20 minutes yesterday, visitors to the YouTube channel of the popular children's show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page's banner to read, " SESAME STREET: I'TS [sic] WHERE PORN LIVES ." In the profile description, the hackers wrote: " WHO DOESN'T LOVE PORN KIDS? RIGHT! EVERYONE LOVES IT…PLEASE DON'T LET SESAME STREET TO GET THIS ACCOUNT BACK KIDS …WE GONNA MAKE ALL THE AMERICA HAPPY! " " We apologize for any inconvenience our audience may have experienced yesterday on our Sesame Street YouTube channel ," read a message on the channel's home page , which appeared to have been restored around 11 a...
Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology

Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology

Oct 17, 2011
Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology Armorize Partners With Symantec to Provide Its Powerful Anti-Malvertising Technology to Symantec's New Solution, AdVantage, to Help Customers Protect Themselves From the Growing Threat of Malicious Advertising Attacks. The partnership will utilize the advanced malware detection engine from Armorize's successful HackAlert product lines to power Symantec's new cloud-based anti-malvertising solution, Symantec AdVantage.The Symantec AdVantage solution will provide its customers with the ability to monitor the ads displayed on their websites for web malware. The product dashboard will also present valuable statistics which enable publishers to compare the quality of ads and ad networks they work with based on the safety ratings and reputation scores for each specific ad or network. Some of the users who visited KickassTorrents (KAT), one of the most popular torrent trackers on the Internet, ...
cyber security

The 2026 CISO Budget Benchmark

websiteWizEnterprise Security / Cloud Security
See how 300+ CISOs are planning 2026 budgets: top trends in AI, cloud, staffing, and tool consolidation shaping next year's security priorities.
cyber security

2025 Cloud Security Survey Report

websiteSentinelOneCloud Security / Identity Protection
Learn from 400+ security leaders and practitioners to get the latest insights and trends on cloud security
UNESCO E-platform domain got hacked by Fatal Error Crew

UNESCO E-platform domain got hacked by Fatal Error Crew

Oct 16, 2011
UNESCO E-platform domain got hacked by Fatal Error Crew The E-Platform domain of one of the Biggest Organisation United Nations Educational, Scientific and Cultural Organization (UNESCO) got hacked and defaced by Fatal Error Crew hackers . Mirror of hack is available here . 
Cyber Cell Mumbai Websites hacked by Pakistani Hacker

Cyber Cell Mumbai Websites hacked by Pakistani Hacker

Oct 15, 2011
Cyber Cell Mumbai  Websites hacked by Pakistani Hacker Pakistani hacker " Shadow008 " from Pakistani Cyber Army again strike back on India's Most Important website of Cyber cell located at Mumbai , India. The Websites is Defaced today Morning and Mirror of Hack also available on Legend-h .This is not 1st time when Indian law enforcement agency site become the target of Pakistani hackers. Last Year, CBI website was also defaced by same "Pakistani Cyber Army".  Hacker post the reason of Hack on deface page as " Site Has Be Hacked For Revenge after they hacked our Pakistani Sites ". Right Now, Site is Recovered back to Original One by officials.
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Oct 15, 2011
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration] " Encipher It " One of the best and easiest AES Text encryptor for Google Mail or anything else. It Provide more secure PBKDF2 (Password-Based Key Derivation Function) key generation. It use Advanced Encryption Standard to protect your data. All encoding/decoding is performed locally in your browser. Video Demonstration by Network NUTS : Subscribe " Network Nuts " You Tube Channel for More Linux Tutorials. Try " Encipher It " Now !
Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Oct 15, 2011
Artillery 0.1 alpha  - New tool for Linux Protection by ReL1K A new Tool " Artillery " - for Linux Protection has been Released by ReL1K (Founder DerbyCon, Creator of the Social-Engineer Toolkit). It's written in Python and completely open-source. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. It's extremely light weight, has multiple different methods for detecting specific attacks and eventually will also notify you of insecure nix configurations. Features: If anyone decides to port scan or touch those ports, they are blacklisted immediately and permanently. It's multi-threaded and can handle as many connections thrown at it. Monitor file integrity leveraging sha-512 database Keeps track of all system files and if anything changes Artillery also monitors the SSH logs, and the event of a brute force attack, blacklists the host forever Extremely Simple Configuration ( /var/artillery/config ) ...
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Oct 14, 2011
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran GRAND RAPIDS – Cyber Styletto is a new novella by a journalist, a writer, and a security expert who have pooled their talents to create an enthralling good read that is future forward and predictive. The facts are based on real vulnerabilities in the way the Internet is constructed. Recent cyber security attacks using sophisticated malware (think Stuxnet) and social engineering techniques have raised the bar for defenders. Cyber Styletto pivots off these cyber events to educate and entertain. It is written as fact-based fiction. The story comes from the minds of Gian DeTorre and Mike Brennan. DeTorre is the pen name of an award winning fiction writer and literary critic whose stories and reviews have been published worldwide. " Cyber Styletto is a new genre in literature, bringing the modern, secretive world of cyber espionage together with a good, old-fashioned thriller ," DeTorre said. I hope our a...
GateOne Beta - Terminal emulator for HTML5 web browsers

GateOne Beta - Terminal emulator for HTML5 web browsers

Oct 14, 2011
GateOne Beta - Terminal emulator for HTML5 web browsers The software makes use of WebSockets to connect a server backend written in Python and a frontend written for modern browsers in JavaScript, HTML5 and CSS. The frontend doesn't require any browser plug-ins to be installed.Gate One also supports HTTP over SSL (https) secure connections from the browser to the server and authentication technologies such as Kerberos. It has its own internal plug-in system (plug-ins can be written in Python, JavaScript and CSS); currently available plug-ins for Gate One include SSH client connections, session recording and playback, and a bookmark manager for storing terminal sessions. Top features: * No browser plugins required! * Supports multiple simultaneous terminal sessions. As many as your hardware can handle. * Users can re-connect to their running terminals whenever they like from anywhere. * Can be embedded into other applications. Add a terminal--running whatever appl...
Launching Wireless Hacking Series for Fun and Profit

Launching Wireless Hacking Series for Fun and Profit

Oct 14, 2011
Launching Wireless Hacking Series for Fun and Profit THN is launching a Wireless Hacking series of blog posts where we will talk about a lot of tools and techniques. We hope this will be fun and informational for all of our readers. The series will be based on the SecurityTube Wireless Security Expert (SWSE) course material. We spoke about it in previous blog posts and loved the course material, and also SecurityTube's spirit of providing the entire course material free and only charging if you are interested in getting certified. As a responsible disclosure, we would like to inform you that we have subscribed to the SWSE course and certification. Once we registered we received the course slides and login to the student portal. This post is a short summary of the study path for the course. The student portal provides a structured path for learning: You can download the course slides, the full course material and watch the welcome video (embedded in the end). Each les...
Hcon’s Security Testing Framework (Hcon STF) v0.1beta

Hcon's Security Testing Framework (Hcon STF) v0.1beta

Oct 14, 2011
Hcon's Security Testing Framework (Hcon STF) v0.1beta After the first demo of Hfox, many people asked about a Chromium based framework for penetration testing/ethical hacking.  After 3 months of work and research, and some input from AJ, the following tool has been developed for the arsenal of Hcon's tools: Specifications 1.         Based on Chromium Source (iron build) version 14. 2.         Works for ever need of hacking/penetration testing such as recon, enumeration, social engineering, exploitation, vulnerability assessment, anonymity, mobile tools, and reporting. 3.         More secure and tracking free from Google and Stable than other Chromium-based builds. 4.         Over 100 tools integrated with easy-to-use interface. 5.         Tested and heavily modified tools with suggestions contribute...
Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

Oct 14, 2011
Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars FEDERAL officials on Wednesday arrested a 35-year-old Florida man, Christopher Chaney  and charged him with 26 counts of cyber-related crimes against Hollywood stars following an 11-month federal probe dubbed "Operation Hackerazzi". Twitter was ablaze earlier today with messages claiming to link to naked pictures of film actress Scarlett Johansson, which were allegedly stolen from her iPhone by a hacker earlier this year.The photographs may or may not be of Scarlett Johansson, but I would suggest that every hot-blooded male exercises some restraint as it's extremely possible that cybercriminals might exploit the interest to post dangerous links on the web designed to infect computers or steal information. To gain access to these email accounts, Chaney would search through details of celebrity lives within magazines as well as social media accounts like Twitter and figure ...
[Contest] Win "Ghost in the Wires" Book by Kevin Mitnick

[Contest] Win "Ghost in the Wires" Book by Kevin Mitnick

Oct 12, 2011
[Contest] Win " Ghost in the Wires " Book by Kevin Mitnick Some call him a saint, some a criminal, others adore him. Industry may loathe him but we here at The Hacker News say, " Get ready, loyal subscribers! " Enter our newest contest and win a copy of Kevin Mitnick's new book titled, " Ghost in the Wires ." Fellow hackers will be pleased to know that to celebrate the release of his book,  Kevin Mitnick  has teamed up with  The Hacker News  and is giving away 3 copies of the book to our readers who submit the coolest, keenest and most appealing comments or reviews about the book. Mitnick is no less than a genius as he knits a story of intrigue and suspense as he navigates through the mazes of high tech companies keeping them jumping and realizing they are not invincible……not even close. How you can be one of the Lucky Winners? Does this sound like something you might be interested in? All you need to do is head on over to the book page:   He...
Expert Insights Articles Videos
Cybersecurity Resources