-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Vulnerability in Google ClientLogin Protocol !

Vulnerability in Google ClientLogin Protocol !

May 17, 2011
Vulnerability in Google ClientLogin Protocol ! A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google's ClientLogin protocol. In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that’s user for authentication. Bastian Könings, one of the researchers from the group, told SecurityWeek, “The adversary could use this authToken to gain full access to the data API of the specific service and view, modify or delete any contacts, calendar events, and web albums of that user.” “The vulnerability isn’t limited to Android Google apps, but to any apps and desktop applications that use Google's ClientLogin protocol over HTTP r...
Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers)

Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers)

May 16, 2011
Pakistan Cyber Army (PCA) owner SHAK Exposed By Indishell (Indian Hackers) Few Days Before , Pakistan Cyber Army got hacked by Indian Cyber Army (Indishell) , and Indishell Got whole Database of PCA site. They Explore the stuff and Got the Real Identity of PCA member, who was continuously hacking the thousands of Indian websites and Servers Daily. In Nov, 2010 CBI  was also hacked by some Pakistan hackers. Lets See What Indishell Got from Their Database Dump : 1.) On Private Message PCA admin Shak is asking for 8000 PKR to Teach Hacking Course (ECH). His Name and Bank details are below -- Name : Bilal Yaqoob Place:- Karachi, Sindhi Country :- Pakistan His Bank or what ever the payment details here are they ID card Number : 35202-1555072-9 PayMent GateWay :- easy paise Mobile number :-03324681620 (U PHONE) Studying in punjab university 2.) Adil, Member of PCA team was arrested (according to Pakistan Govt) ,in case of Cyber attack on Pakistan P...
#OpEverest : Anonymous make Central website of the Nepal Government Down

#OpEverest : Anonymous make Central website of the Nepal Government Down

May 16, 2011
#OpEverest :  Anonymous make Central website of the Nepal Government Down Anonymous have new #OpEverest Against Nepal Government . The open letter to Govt of Nepal from Anonymous is as shown. Nepal Government website is down because of DDos attack ! Link : http://www.nepalgov.gov.np/ They have define next some targets also : * http://www.ucpnm.org/ * http://www.nepalicongress.org/ * http://www.cpnuml.org/ * http://www.mjfn.org/ Stay Tuned for Updates :)
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Pentest Like Attackers Actually Do. SEC560 at SANSFIRE 2026

websiteSANS InstituteLive Training / Cybersecurity
From Kerberoasting to domain dominance—SEC560 covers the full kill chain. Washington, D.C., July 13.
Fake antivirus campaign on India’s DNA e-newspaper website !

Fake antivirus campaign on India’s DNA e-newspaper website !

May 16, 2011
Fake antivirus campaign on India’s DNA e-newspaper website ! DNA (Daily News and Analysis) is an Indian daily English language newspaper. According to Wikipedia, DNA ranks 8th among the top ten English dailies in India. Recently, the Zscaler solution was blocking access to this site, as it contained malicious content. Here is the homepage of this website: The ‘Today’s E-newspaper’ link (circled above) is an online version of the printed periodical. We discovered that one of the pages from this e-newspaper site was infected with malicious script. Here is the screenshot of that page: The malicious script tag had been inserted in plain text as can be seen in this screenshot of page source: The malicious script tag directs the victim’s browser to ‘hxxp://vcvsta.com/ur.php’. This page then redirects the user to another malicious site (‘hxxp://www4.to-gysave.byinter.net,), which will again redirect victim to random sites hosting fake antivirus campaigns. Here is the screenshot disp...
QuickRecon v0.3 version released !

QuickRecon v0.3 version released !

May 16, 2011
QuickRecon v0.3 version released ! QuickRecon is a simple information gathering tool that allows you to: find subdomain names, perform zone transfer, gather emails and find human relationships using microformats. It is a simple information gathering utility based on Qt4 toolkit. Download QuickRecon v0.3 here
Expert Insights Articles Videos
Cybersecurity Resources