#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

'Esperanza Spalding' Wiki Page Hacked (Photo) By 'Justin Bieber' Fans !

'Esperanza Spalding' Wiki Page Hacked (Photo) By 'Justin Bieber' Fans !

Feb 15, 2011
After the 2011 Grammys, many people were left asking, " Who is Esperanza Spalding? " The little known jazz singer took home a 2011 Grammy for Best New Artist, beating out teen pop sensation Justin Bieber. Legions of Justin Bieber fans weren't too happy with the Esperanza Spalding Grammy win . Many took to Twitter to vent about how Justin Bieber should have won a Grammy. Other members of Bieber Nation hacked the Esperanza Spalding Wiki page. First, Esperanza Spalding's middle name was changed to " Quesadilla. " The bio on the Esperanza Spalding Wiki page said: " JUSTIN BIEBER DESERVED IT GO DIE IN A HOLE. WHO THE HECK ARE YOU ANYWAY? " Later, some Bieber hater wrote " HaHa Justin Bieber, you're just a little boy with no Grammy for Best New Artist. " Here is a Esperanza Spalding wiki hack photo
Hackers Are Targeting Facebook via spreading malware !

Hackers Are Targeting Facebook via spreading malware !

Feb 15, 2011
Facebook accounts are becoming favorite targets of hackers. If your account has been hacked, you could be in good company considering Facebook founder Mark Zuckerberg and French President Sarkozy have also been victims. Actually, thousands -- maybe millions -- of Facebook pages have been hacked. The hackers then use the accounts to send out erroneous messages to "friends." One of your friends seems to have sent you a video or awesome photo or link, and suggests you click on it. The computer screen tells you to log in again to see the video or photo or quiz. But as soon as you sign in,  you are giving your information to a hacking site, which now has your screen name and password.You probably would be suspicious of a strange e-mail in your inbox, but when you believe you are getting a link from a friend on a social network, you might not be so cautious. You have actually been caught by one of the most common forms of hacking called "phishing." Recently estimated ...
Facebook, Youtube & Twitter Officials Keep Quiet on Its Role in Revolts that toppled governments in Tunisia and Egypt !

Facebook, Youtube & Twitter Officials Keep Quiet on Its Role in Revolts that toppled governments in Tunisia and Egypt !

Feb 15, 2011
With Facebook playing a starring role in the revolts that toppled governments in Tunisia and Egypt, you might think the company's top executives would use this historic moment to highlight its role as the platform for democratic change. Instead, they really do not want to talk about it. The social media giant finds itself under countervailing pressures after the uprisings in the Middle East. While it has become one of the primary tools for activists to mobilize protests and share information, Facebook does not want to be seen as picking sides for fear that some countries — like Syria, where it just gained a foothold — would impose restrictions on its use or more closely monitor users, according to some company executives who spoke on the condition of anonymity because they were discussing internal business. And Facebook does not want to alter its firm policy requiring users to sign up with their real identities. The company says this requirement protects its users fro...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Finally U.S. Policy to Address Internet Freedom !

Finally U.S. Policy to Address Internet Freedom !

Feb 15, 2011
 Days after Facebook and Twitter added fuel to a revolt in Egypt, the Obama administration plans to announce a new policy on Internet freedom, designed to help people get around barriers in cyberspace while making it harder for autocratic governments to use the same technology to repress dissent. The State Department's policy, a year in the making, has been bogged down by fierce debates over which projects it should support, and even more basically, whether to view the Internet primarily as a weapon to topple repressive regimes or as a tool that autocrats can use to root out and crush dissent. Secretary of State Hillary Rodham Clinton, who will lay out the policy in a speech on Tuesday, acknowledged the Internet's dual role in an address a year ago, and administration officials said she would touch on that theme again, noting how social networks were used by both protesters and governments in the uprisings in Tunisia, Egypt and other Arab countr...
Brandon Township's website Receive Warning From Hackers !

Brandon Township's website Receive Warning From Hackers !

Feb 15, 2011
Several Ortonville-area websites had similar messages from hackers Monday morning, warning the website owner of its vulnerability. "Your site has been hacked by me because we love you and we want to warn you," the hacker's message read. James Ellis, of Brandon Computers, is in charge of Brandon Township's website, www.BrandonTownship.us . It was one of many sites sharing the same server that were hacked. "For several years I have been doing this, and this is the first time I've seen it," Ellis said. Ellis said he fixed the problem and that there is no personal information on the site that can be stolen by hackers. The other websites belong to mostly local churches, Ellis said. Jay Radcliff, a web securities specialist, said vulnerable websites are listed on the Internet. He said hackers can find the websites through simple searches. "It's kind of like graffiti," Radcliff said. "They mark their territory saying, 'Hey, yo...
Expert Insights Articles Videos
Cybersecurity Resources