-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

China Hackers hacked into secret South Korean military files !

China Hackers hacked into secret South Korean military files !

Mar 07, 2011
CHINESE computer hackers last June gained access to secret South Korean military files on a planned spy plane purchase from the United States, a Seoul lawmaker says. The hackers accessed information in defence ministry computers on the plan to buy unmanned Global Hawk aircraft, said Shin Hak Yong, an opposition Democratic Party lawmaker and a member of parliament's defence committee. 'A government official reported the incident to me... the government has not raised the issue with China yet and is still debating how to handle it,' Shin's spokesman quoted him as saying, confirming his comments reported in Monday's Chosun Ilbo newspaper. Seoul last year earmarked 45.2 billion won (S$51.2 million) for the spy plane purchase following the North's alleged attack on a South Korean warship that left 46 sailors dead in March 2010. Cross-border tensions escalated further after Pyongyang's shelling attack on a frontier island that killed four South Koreans inc...
Microsoft Releases Zero IE8 Security Updates Before "Pwn2Own" !

Microsoft Releases Zero IE8 Security Updates Before "Pwn2Own" !

Mar 07, 2011
Microsoft has opted not to release any patches to its Internet Explorer 8 browser prior to this year's Pwn2Own browser exploit challenge, which is set to run from March 9 to March 11 at the CanSecWest security conference. There's been no indication as to why Microsoft's not making one last effort to plug security vulnerabilities within Internet Explorer 8. Pundits have suggested that the company might be waiting to see exactly what exploits and security flaws are uncovered by the various contestants in the annual contest, such that the company can more quickly address them post-Pwn. For the uninitiated, Pwn2Own works like this: Security researchers square off in an attempt to hack through the browser or mobile operating systems of eight different targets. Each Pwn2Own entrant or team has 30 minutes to compromise the browser or phone, and each device or web browser has—at maximum—four individuals or teams competing. The first group to successfully hack a device or browse...
Cyber terrorism among greatest challenges of today for India !

Cyber terrorism among greatest challenges of today for India !

Mar 07, 2011
Your credit card number and its code is the new currency in contemporary world where thieves skim the money right from your banking account. It is the new world where the cyberspace poses threats along with its immense impact on how we live and conduct our day-to-day business - it is the topic of a two-day seminar on cyber crime that started at Bhaikaka Hall near Law Garden on Saturday. Organized by the Institute of Engineers ( India), Gujarat State Centre in association with DST, Gujarat Electronics and Software Industries Association and CSI, the seminar will see discussion on real-life cases and legal hassles where experts from various fields will share their thoughts on the subject. "With the reach of internet, it is a high time to educate ourselves about the threats looming large and find a solution for it," said Bharat Patel, convener of the seminar. Despite significant advancement in technology, cyber terrorism is one of the greatest challenges for our society,...
cyber security

2026 Annual Threat Report: A Defender’s Playbook From the Front Lines

websiteSentinelOneEnterprise Security / Cloud Security
Learn how modern attackers bypass MFA, exploit gaps, weaponize automation, run 8-phase intrusions, and more.
cyber security

Free Assessment: Identify Hidden Internal Risk.

websiteBitdefenderAttack Surface / Threat Detection
Discover unnecessary user access to risky tools, shadow IT, based on real user behavior.
Facebook new Vulnerability, Lots of Accounts misused for spamming !

Facebook new Vulnerability, Lots of Accounts misused for spamming !

Mar 06, 2011
Facebook new Vulnerability , Lots of Accounts misused for Spamming !  Facebook New Vulnerability, This time Facebook Groups are Vulnerable , One by one we getting more on more bugs in Facebook. Last days their was lots of bugs in Facebook page, because of that lots of big pages got hacked, Now 1000's of facebook profiles are misused to do spam on facebook groups. Total Exposure :  The current bug allows you to post as any user whose email address you know. You don’t need any other user access, no password nothing. The only two things you’ll need are: 1.) User’s email address (from their facebook profile). 2.) A group email address of which user is a part ( on groups’ homepage). Final Hack : After you have both these details send a spoofed mail from user to group email and bang it will be posted from user’s profile without any need of password. Notice : We have already submit this bug to facebook authorities, Hope they will fix it ,as soon as p...
Shia Community Forums hacked by ALM3R3FH

Shia Community Forums hacked by ALM3R3FH

Mar 06, 2011
Shia Community Forums hacked by ALM3R3FH Hacked site :  www.shiaforums.com Mirror: http://zone-h.com/mirror/id/13185345 News Source : ALM3R3FH
Expert Insights Articles Videos
Cybersecurity Resources