#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Hydrotech.org.pk Defaced by Underground Devil (HACKNUTS)

Hydrotech.org.pk Defaced by Underground Devil (HACKNUTS)

Mar 05, 2011
Hydrotech.org.pk Defaced by Underground Devil (HACKNUTS) Hacked Site  :  https://hydrotech.org.pk/
Leethackers.org (ShadowNET aka Envy) Hacked by TinKode !

Leethackers.org (ShadowNET aka Envy) Hacked by TinKode !

Mar 05, 2011
Leethackers.org ( ShadowNET aka Envy ) Hacked by TinKode ! Hacked Link :   https://leethackers.org/board/cache/ Mirror : Click Here
Anonymous : We have Revolution in mind, we can change the World !

Anonymous : We have Revolution in mind, we can change the World !

Mar 05, 2011
Anonymous : We have Revolution in mind , we can change the World ! We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us. — Anonymous They are Internet Heroes, hackers and hijackers, information rebels, revolutionaries and resisters. They are you, me, the grunt in the next cubicle, the geek who fixes your computer. They are Anonymous, an informal collective of  interactivists  that last month virtually armed protestors in Tunisia and Egypt with the necessary knowledge to topple governments: How to keep safe during protests. How to bypass censors. How not to leave an online trail. How to keep posting YouTubes when the dictators have pulled the Internet plug. One more very special lines I have written for Anonymous Hackers as below : We r Anonymous Hackers,bt we dnt Hack the Humanity.. We hate studies,Bt we love technology... World Can't Change Us,Bt We can CHANGE THE WORLD... We dnt have books in hand,Bt we have revolution in mind... We r the rares...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Continuously Monitor Your Cyber Insurance Requirements

websitePreludeSecurity Control Validation
Quickly spot the critical control gaps that mean the difference between a successful claim or losing millions.
Cyber Attacks Hit Nearly 40 South Korean websites !

Cyber Attacks Hit Nearly 40 South Korean websites !

Mar 05, 2011
According to a new report, 40 South Korean websites came under a cyber crime attack by a computer virus, including the presidential Blue House, South Korea's biggest bank , a major online auction house, the Foreign Ministry, the two largest search engines in the country and Korean military website. Although it was not immediately clear who has been behind the attack, the National Police Agency began investigating the assault that has been discovered by AhnLab, a leading Internet security firm based in Seoul. Most computer analysts declared that the episode was a distributed denial of service cyber crime attack. Usually, in such cases, the infected computers also known as zombies try to access targeted websites at the same time in an attempt to overwhelm the sites with a surge of traffic that crashes their servers. According to a statement released by a South Korean government official the computer system at the Blue House has not been damaged too bad. "We were attacked, but it was def...
Mozilla introduces the "Web Apps" project just before release of  release of Firefox 4 final !

Mozilla introduces the "Web Apps" project just before release of release of Firefox 4 final !

Mar 04, 2011
Shortly before the release of the final version of Firefox 4, the Mozilla developers have introduced the " Web Apps " project. These apps are expected to play a major role play in future browsers, and in such a future, the browser will not just be for viewing web pages but will be a platform for locally installed applications. Web Application programmers need do little more than create a manifest; this is a specification which lists the structure and content of the application, and is enough to deploy the app. Applications are able to share resources and will make use of the HTML5 specification for offline caching of these resources by means of the application cache. Instead of users having to go through the normal procedure of installing and launching applications, Mozilla provides new JavaScript functions to perform these tasks. A User Agent will install the app, launch it, and grant additional privileges. Mozilla is making available experimental Web Apps extensions for ...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>