#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

E-Mails Hacked By Anonymous Hackers Raise Concerns !

E-Mails Hacked By Anonymous Hackers Raise Concerns !

Feb 17, 2011
Late last year, activists attacked websites belonging to companies that refused to do business with WikiLeaks, an online group that has disclosed classified U.S. government documents. When the activists, who called themselves Anonymous, found out they were being investigated by the Internet security company HBGary Federal, the group hacked the company's servers and stole thousands of private e-mails. And then it dumped them onto the Internet. It was an embarrassment for the security company to get hacked — but the content of some of those e-mails is raising concerns. 'Brazen' E-mails HBGary Federal was trying to use social networks to unmask the members of Anonymous, so Anonymous struck back. One man, who calls himself Owen, says his Anonymous colleagues broke into the company's servers. Hackers have a name for what they did. "They decided to just rape his servers and take all the information they wanted," he says. "Forgive that term ... 'R...
3G technology will increase cyber crime !

3G technology will increase cyber crime !

Feb 17, 2011
Cyber Crime has now reached to hacking information from the mobile phones. The 3G technology recently launched by the mobile service providers is in much rage nowadays. The 3G technology allows a user to access internet on a good quality network on the cellphone. As such hackers will now target the 3G users for accessing their personal information and this in turn will result into increased cyber-crime", said Sunny Vaghela, the cyber-crime expert while talking to TOI. When questioned is there any solution to this new problem, Vaghela mentioned that as of now there exists no solution to prevent hacking from taking place from a mobile phone but he added that certain steps can be taken to minimise the cases of hacking. "Never reply to the e-mails that offer lottery prize money. Always keep your anti-virus updated and do not download pictures of celebrities from mails sent by anonymous sender. Also avoid downloading songs from Pakistani wesbites. All these steps if taken can ...
Anonymous hackers planning real-world attacks !

Anonymous hackers planning real-world attacks !

Feb 17, 2011
A computer security firm working to expose members of hacker group "Anonymous" pulled out of a premier industry conference here due to threats of real-world attacks on its employees. HBGary personnel have been peppered with threatening messages since Anonymous hackers looted data from its computer systems earlier this month, according to a message on the California firm's website Wednesday. "In addition to the data theft, HBGary individuals have received numerous threats of violence, including threats at our tradeshow booth," the company said. "In an effort to protect our employees, customers and the RSA Conference community, HBGary has decided to remove our booth and cancel all talks." Cyber security specialists and national security officials are in San Francisco this week to share insights on topics ranging from guarding "smart" power grids to blocking attacks on smartphones and computer tablets. Anonymous, the hacker group behind online ...
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Hacked security firm backs out of security conference !

Hacked security firm backs out of security conference !

Feb 17, 2011
It has really got to hurt when you run a computer security company and an outlaw hacker group manages to steal and post on the Internet embarrassing emails connecting you to much-publicized plans for crushing the enemies of large corporations through unsavory means like disinformation and cyberattacks. Especially when it happens just before one of the security industry's largest annual conferences, at which you have not only been invited to speak but have rented a booth and set up meetings with numerous executives of potential customers. That was the situation facing Greg Hoglund, CEO of HBGary Inc. of Sacramento, at the start of this week's RSA security conference in San Francisco after a pro-WikiLeaks group of hackers calling themselves "Anonymous" posted tens of thousands of emails detailing, among other things, the fact that a spin-out company called HBGary Federal helped develop proposals to combat critics of Bank of America and the U.S. Chamber of Commerce thr...
Lush takes down two regional sites following another hack !

Lush takes down two regional sites following another hack !

Feb 17, 2011
Last month's compromise of the UK website of the natural ingredients cosmetic firm Lush and the theft of its customers' credit card details must have hurt the company but unfortunately, its troubles are not over yet. "We are sorry to have to announce that the Lush Australian and New Zealand websites have been hacked," it says in a statement posted on the sites in question, whose contents have been completely removed while security checks are performed. "We have been alerted today to advise us that entry has been gained and customer personal data may have been obtained by the hackers. We urgently advise customers who have placed an online order with Lush Australia and New Zealand to contact their bank to discuss if canceling their credit cards is advisable," encourages the company. Whether that means that Lush hasn't been storing that data in encrypted format or whether it really wants to cover all bases just in case, it's anyone's guess. It...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>