-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Wi-Fi Challenge by Security Tube !

Wi-Fi Challenge by Security Tube !

May 15, 2011
Wi-Fi Challenge by Security Tube ! 1. Objective: This series of challenges is aimed at testing your skills as a Wireless Hacker! We will posting challenges ranging from - Basic, Intermediate, Advanced, Expert and Insane levels! Our first challenge remain uncracked which we categorized as "Basic" :) Challenge 1: http://www.securitytube.net/video/1856 Challenge 1 Solution: http://www.securitytube.net/video/1859 Just posted Challenge 2 : http://www.securitytube.net/video/1862 Which still remains uncracked! 2. Prizes: All Expert and above challenges will have prizes which will be announced in the challenge video. Any level below that qualifies for a prize automatically if unsolved for 24 hours. Challenge 2 is currently unsolved for 21 hours! :) Prize will be an Alfa Networks Wireless card if this remains unsolved for 3 more! So hurry up and participate to win! 3. Joining the Competition: Just go to the Challenge 2 URL above, download the trace file on the p...
PlayStation 3 update 3.61 available Now, PSN begins today !

PlayStation 3 update 3.61 available Now, PSN begins today !

May 15, 2011
PlayStation 3 update 3.61 available Now, PSN begins today ! Today good news for all the PS3 lovers, your PS3 Now will be able to connect to PlayStation Network, today Sony has solved its PSN outage and updated its System to (v3.61) but notes that the update will prompt you to change your PlayStation Network password. This is what the PlayStation blog has updated and you need to read about the new update: We have been working on a new PS3 system software update that requires all PSN users to change their password once PlayStation Network is restored. The update (v3.61) is mandatory and is available now. If using a PS3, your password can only be changed on your own PS3 (or a PS3 on which your PSN account was activated), as an added layer of security. If you have never downloaded any content using your account on the system, an email will be sent to the registered sign-in ID (email address) associated with your account when you first attempt to sign-in to PSN. This e-mail will cont...
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

Hackers Got Hacked, HackingTips.in Hacked By Shadow008 !

May 15, 2011
Hackers Got Hacked, HackingTips.in Hacked By Shadow008 ! Sites Hacked : http://www.hackingtips.in/ Mirror : http://www.zone-h.com/mirror/id/13877058
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Pentest Like Attackers Actually Do. SEC560 at SANSFIRE 2026

websiteSANS InstituteLive Training / Cybersecurity
From Kerberoasting to domain dominance—SEC560 covers the full kill chain. Washington, D.C., July 13.
417 U.K websites Got hacked , Server compromised !

417 U.K websites Got hacked , Server compromised !

May 15, 2011
417 U.K websites Got hacked by SeeKeR , Server compromised ! Hacked sites List :  http://pastebin.com/J45HhJfs
Crimepack 3.1.3 Exploit kit Leaked, available for Download !

Crimepack 3.1.3 Exploit kit Leaked, available for Download !

May 15, 2011
Crimepack 3.1.3 Exploit kit Leaked, available for Download ! Part 1 : Java Exploit As stated above, I focus on a malware that exploits a recent JRE vulnerability: CVE-2010-0840 to execute malicious files on a victim system. This malware comes inside a jar file, which contains the following two classes: Crimepack.class and KAVS.class. Part 1.1 : Crimepack.class This class is the engine of the malware, it is obfuscated, but you can quickly strip off the obfuscation (my python beta tool is great…), once you get rid of the obfuscation you can see the following code: As always, we have an Applet that access to the data parameter, generates a random name for the exe payload that will be dropped in the system temp directory and then executed. So at this point as you can see we have nothing new, the above is a common Java downloader… but let’s scroll down: Above, we can see that the malware is creating a new instance of the KAVS class (description follows), in order to trigge...
Expert Insights Articles Videos
Cybersecurity Resources