#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Is WikiLeaks Really Hacking for Secrets !

Is WikiLeaks Really Hacking for Secrets !

Feb 05, 2011
In April 2009 the whistle-blower website WikiLeaks appear a abstruse U.S. aggressive certificate account abstruse capabilities of the U.S. Navy's Pacific Missile Range Facility on Kauai. In an online column answer how it acquired the information, WikiLeaks adumbrated alone that it came from "a source." It was addition accomplishment for WikiLeaks and its founder, Julian Assange, who describes the extensive organization—it has no anchored domicile—as a defended agenda bead box for antagonistic insiders. He has again said WikiLeaks doesn't actively access classified abstracts but rather provides a belvedere for others who accept arcane advice to acknowledge for the attainable good. Except that WikiLeaks, according to Internet aegis aggregation Tiversa, appears to accept bolter bottomward that aggressive certificate itself. Tiversa says the accumulation may accept exploited a affection of file-sharing applications such as LimeWire and Kazaa that are generally acclimate...
Nasdaq systems were hacked last year !

Nasdaq systems were hacked last year !

Feb 05, 2011
Federal authorities are investigating a computer advance at the aggregation that runs the Nasdaq banal exchange, the Wall Street Journal arise Friday. According to the report, which cites bearding sources, Nasdaq OMX Group computers were compromised ancient over the accomplished year, but the company's trading belvedere was unaffected. "So far, [the perpetrators] arise to accept aloof been attractive around," the Journal quotes one antecedent as saying. Nasdaq OMX Group runs a cardinal of banal exchanges, including the U.S. Nasdaq, and exchanges that barter in Copenhagen, Stockholm, Helsinki, and the Baltic region. The analysis is actuality conducted by the U.S. Federal Bureau of Analysis and the U.S. Secret Service, the address states. Nasdaq assembly could not be accomplished anon for comment. Hacking incidents like this are acceptable added common, as boundless e-mail and Web-based computer attacks abide to beat workers in corporations and in government. In som...
Lovely-faces.com Dating site takes 250,000 pictures and names of Facebook users !

Lovely-faces.com Dating site takes 250,000 pictures and names of Facebook users !

Feb 04, 2011
Creators of a affected dating armpit accept taken claimed advice from 250,000 Facebook profiles - and reproduced it after the ability of the associates of the accepted amusing networking site. Lovely-faces.com uses the names and photos of Facebook associates and again gives users the advantage to 'arrange a date' with the biting volunteers - which leads them to the aboriginal contour folio of the person. The aimless bodies accept been aggregate into adulatory categories, such as 'Smug Women' and 'Climber Men', which are advised alone by their appearance. The database can be searched by nationality, gender or by character. Users can additionally vote to adjudge what anniversary being is like and amount how 'cool' they are. The creators, Paolo Cirio and Alessandro Ludovic, accept dedicated their armpit by claiming it is an art activity and they are alone accumulative the aperture of aloofness acceptable by Facebook. 'Facebook, an endlessly ...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Maximize the Security Tools You Already Have

websitePrelude SecuritySecurity Control Validation
Hone your EDR, identity, vuln, and email platforms against the threats that matter with a 14-day trial.
THC-HYDRA v6.1 brute force tool Released !

THC-HYDRA v6.1 brute force tool Released !

Feb 04, 2011
One of the most famous network logon cracker - THC-HYDRA, has been updated! We now have THC-HYDRA version 6.1 in less than a fortnight! "THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX." This is the change log: More license updates for the files for the debian guys Fix for the configure script to correctly detect postgresql Add checks for libssh v0.4 and support for ssh v1 Merge all latest crypto code in sasl files Fix SVN compilation issue on openSUSE (tested with v11.3) Download THC-HYDRA v6.1
Google Hacking Diggity Project, Advance Search Engine Hacking Tool !

Google Hacking Diggity Project, Advance Search Engine Hacking Tool !

Feb 04, 2011
The Google Hacking Diggity Activity is a analysis and development action committed to investigating the best recent techniques that advantage chase engines, such as Google and Bing, to bound analyze accessible systems and acute abstracts in accumulated networks. The activity folio contains downloads and links to our best recent Google Hacking analysis and chargeless aegis tools. Defensive strategies are additionally introduced, including avant-garde solutions that use Google Alerts to adviser your arrangement and systems. With the retirement of Google's SOAP Chase API on September 7, 2009, best of the aegis utilities accessible for Google Hacking cease to function, abrogation the aegis industry with a charge for fresh and avant-garde tools. GoogleDiggity is a fresh MS Windows command band account advised to advice ample that need. GoogleDiggity leverages the Google AJAX API, so it will not get you blocked by Google bot apprehension while scanning. Also, clashing added Google Hacking ...
Expert Insights Articles Videos
Cybersecurity Resources