#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

World's Largest Touchscreen Hacked !

World's Largest Touchscreen Hacked !

Feb 23, 2011
It's gigantic ! It can handle over 100 simultaneous touch points! It has a curvature of 135 degrees! And best of all, it is NOT the newest, insanely expensive gadget to hit the market. Instead, this touchscreen was hacked together with a bunch of PCs, video cameras, projectors and cheap infrared illuminators at the University of Groningen, in the Netherlands. It works like this: "The cameras, illuminators and projectors are all placed behind a large, cylindrical screen (formally used as a 3D theater). Due to the diffuse layer on the front side of the screen, the cameras cannot see clearly through the screen, however whenever someone touches the screen, enough of the infrared light is reflected back to see the tip of the finger. The difference is very small (on a scale of 0-255 the difference is only 2 or 3), but still big enough to be seen by the computers that analyze the images from the cameras." The display is used to teach mathematics and computer science students ...
Kim Kardashian Twitter account Hacked !

Kim Kardashian Twitter account Hacked !

Feb 23, 2011
Many celebrities have fallen prey to Internet pranksters and the latest name added to the list is reality TV star Kim Kardashian, whose Twitter account has been hacked. The 30-year-old socialite has appealed to bosses of the microblogging site to restore the security of her account after she discovered that an imposter had sent fake tweets on her behalf." My twitter has been hacked! Twitter help!!!! I can sign on from my phone app but no where else and see some fake tweets here (sic), " wrote the 30-year-old on her Twitter page." Twitter please help me get my password back! How is it that I can tweet from my cell but my home computer says wrong password! Hacked (sic), " she wrote in a post.Her sister Kourtney added, " Some stalker hacked Kim Kardashian twitter and email... So just beware of her tweets. " Stars who fell victim to Twitter hackers recently are Selena Gomez, rapper Swizz Beatz and British funnyman Matt Lucas.
Anonymous Hackers Call United Nation (UN) for their Responsibilities Regarding Libya !

Anonymous Hackers Call United Nation (UN) for their Responsibilities Regarding Libya !

Feb 22, 2011
Anonymous Hackers Call United Nation (UN) for their Responsibilities Regarding Libya ! NOTE :  One More Press Released By Anonymous Hackers on there official site/Facebook/Twitter. We are Publishing This news, just as the Media of "Hacking Field" . These is No relation b/w 'The Hacker News' & 'Anonymous Hackers'. In their Press Release They wrote : Call the responsibilities of the UN Dear United Nations:   Anonymous wishes you to act.   We are watching the developments in Libya and are shocked. Shocked by the images we've seen. Shocked by the things Libya's Anons have told us. Shocked by the fact that one man ignores the voices of his citizens and opens fire on them. Shocked by the fact that even with generals and diplomats deserting, this man is still ignoring the will of his people and unwilling to accept their human rights People ought not have to fear their leaders; leaders ought to fear their people. In too many places, though, this is cur...
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
BackTrack 5 ( BT5 ) Coming Soon !

BackTrack 5 ( BT5 ) Coming Soon !

Feb 22, 2011
BackTrack 5 ( BT5 ) Coming Soon ! We're behind schedule with BackTrack 5 , but are working hard to make up for lost time. We thought we'd post a few pictures for your enjoyment of the development BT5 ISO we're working on. The screenshots were taken on a 2.6.38-rc5 kernel. The screenshot above is of the KDE 4 theme currently in development. The screenshot above is of the current OSSIM compatible menu structure (WIP). The screenshot above is of working IEEE r8187 drivers on our new kernel. Take into account that many things may and will change in terms of appearance – these are initial mockups are are creating for various environments. Final release in a couple of months at least. News Source : BackTrack
OllyDbg 2.01 Alpha 2 Tool New Version Download !

OllyDbg 2.01 Alpha 2 Tool New Version Download !

Feb 22, 2011
" OllyDbg is a 32-bit assembler level analysing debugger for Microsoft ®  Windows ® . Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable . " Version 2.01 alpha 2 is an intermediate functional release with many new useful features. The most important novelty is that   this version is compatible with Windows 7 . I have tested it under Win7 Home Premium 32-bit. If you find any problems, please inform me immediately. Don't forget to add the screenshot of the Log window. Other improvements: - Aware of avast! antivirus and modifications it makes to the PE header;   - .NET analysis, very rough yet. .NET debugging is not supported, but at least I can disassemble CIL and parse .NET st reams; - Speech API support. You need SAPI 5.0 or higher installed on your computer. Open Options, select Text-to-speech and check "Activate text-to-speech"; - List of found switches; - List of referenced GUIDs. Int...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>