#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Google & Mozilla Patches Browsers Before Pwn2Own Hacker Contest !

Google & Mozilla Patches Browsers Before Pwn2Own Hacker Contest !

Mar 04, 2011
Now that the annual Pwn2Own hacking contest is around the corner, both Google and Mozilla are busy patching flaws in their respective browsers to appear competent in the contest. Both internet giants have reportedly updated their browsers for the contest that is due to take place next week at the CanSecWest Applied Security Conference. Google patched 19 flaws in its Chrome and rated 17 of them as "high" whereas the other three as "Medium". Mozilla followed Google's step and introduced patches for 10 flaws in its Firefox. It classified eight of the security flaws as "critical" whereas it rated others as "Moderate" and "High" respectively. Google rewarded the researchers who fixed the bugs with an attractive sum, the highest being $1,000. The patching was carried out in different areas including an integer overflow during the process of textarea handling. Google's URL bar spoof was also updated. The major flaw that was updated by Firefox consists of a bug that if activated by a corrupt...
DHS Needs to Change Rules to Recruit Hackers into U.S. Security Agencies !

DHS Needs to Change Rules to Recruit Hackers into U.S. Security Agencies !

Mar 04, 2011
Members of the hacker community are leery of working with the government and sharing their skills, if it means navigating through outdated regulations and being viewed as potential security risks. Hackers and other computer experts willing to collaborate with the Department of Homeland Security to bolster the nation's cyber-defense are unable to do so because of red tape, according to the former head of the department. Tom Ridge and Michael Chertoff, two former secretaries of Homeland Security, joined current DHS boss Janet Napolitano to discuss the evolution of threats facing the United States, including the challenges of securing cyber-space. They expressed their views during a March 2 roundtable discussion at Georgetown University, which was webcast by the Aspen Institute, marked the department's eighth anniversary. "The portfolio of threats is a lot broader," Ridge said. There are a number of possible scary scenarios, including a sophisticated hacker from another country break...
Ethical hacker (CEH) training now in syllabus of Riphah International University,Pakistan !

Ethical hacker (CEH) training now in syllabus of Riphah International University,Pakistan !

Mar 04, 2011
Islamabad: The first-ever 'Ethical Hacking and Countermeasures (CEH)' training course organised by the Riphah International University, in collaboration with internationally renowned information security certification body, EC-Council, concluded here on Wednesday. Riphah International University is the first academic partner of EC-Council in Pakistan. EC-Council offers trainings in over 60 countries and has trained over 80,000 professionals. Its certifications are recognised by US governmental agencies like National Security Agency (NSA), Federal Bureau of Investigation (FBI) and the Committee on National Security Systems (CNSS). Under the partnership, RIU offers the complete range of EC-Council certifications. The goal of a trained ethical hacker is to help an organisation take pre-emptive measures against malicious attacks by attacking the system himself to expose its vulnerabilities that can be exploited by malicious hackers. As technology advances and organisation depend on tec...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Continuously Monitor Your Cyber Insurance Requirements

websitePreludeSecurity Control Validation
Quickly spot the critical control gaps that mean the difference between a successful claim or losing millions.
WordPress under massive DDoS attack !

WordPress under massive DDoS attack !

Mar 04, 2011
Readers of Financial Post or National Post blogs might have found them difficult, if not impossible, to access Thursday morning. That is because WordPress, the platform through which every FP and NP blog has been published for the past 10 months, has been under attack by hackers for the past several hours. Using the same method as the hackers who brought down the main websites of Visa, Mastercard and PayPal last year to support the whistle-blowing website WikiLeaks, Thursday's attacks have caused thus far untold numbers of WordPress-powered blogs to become nearly inaccessible. "WordPress.com is currently being targeted by an extremely large Distributed Denial of Service attack [DDoS] which is affecting connectivity in some cases," said Sara Rosso of WordPress VIP services in a blog post Thursday morning. "The size of the attack is multiple Gigabits per second and tens of millions of packets [of data] per second." "We are working to mitigate the attack, but because of the extreme si...
Mobius Forensic Toolkit v0.5.7 released !

Mobius Forensic Toolkit v0.5.7 released !

Mar 03, 2011
Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tool. Changelog Six news registry reports were added: user assist, recent docs, product keys, O.S. folders, user logon info, and computer info. Minor improvements were made. Installation As root, type:  python setup.py install Usage Run  mobius_bin.py . Download
Expert Insights Articles Videos
Cybersecurity Resources
//]]>