-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03

Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03

Jun 06, 2011
Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03 The Hacker News ,June Month Magazine is Released Now ! GET YOUR COPY TODAY. Its our Issue 03 with theme " Total Exposure " . We hope this monthly magazine will keep you update in Cyber World. Content : - Total Exposure - Wikileaks : Exposure in true way - Guide about selecting your Computer Security Consultant - In the Realm of Cyber Breach - Exploit Writers : Challenging Cyber Security - Interview with Team Inj3ct0r - IT Security Incident Management - Interview with Core Anonymous Member : Anony_ops - Exposure of Password secrets of Apple Safari - Sony Hacked , Again hacked & Again Hacked - Hacking News Highlights of the Month - Hackers Toolkits Updates - Security Tool : Buffer Zone Download THN Magazine -- Rar File | PDF file (7.78 Mb) Also Get Previous Issue 01 & 02 here
National Informatics Centre (NIC INDIA) got hacked by Anonymous !

National Informatics Centre (NIC INDIA) got hacked by Anonymous !

Jun 06, 2011
National Informatics Centre (NIC INDIA) got hacked by Anonymous ! National Informatics Centre (NIC INDIA) got hacked by Anonymous (India).  Purpose of this defacement is just to awake the Govt of India . Anonymous now start Operation India against corruption. Anonymous are world famous activist and always fight against Injustice. Defaced Site :  http://informatics.nic.in/oldnewsonline/abc.html Just today Morning the Anonymous Core team announce the about operation India on there official Twitter : All Indians and Anonymous are Invited to Join the Revolution against Corruption in India at :  http://www.facebook.com/OperationIndia  and on Twitter :  https://twitter.com/#!/operationindia When corruption, destruction and mayhem strikes from governments or corporations it is the goal of anonymous to awaken that entity and the public that a change must occur.As price pritchet once said, " change always comes bearing gifts. "Anony...
Sony Music Brazil Gets defaced !

Sony Music Brazil Gets defaced !

Jun 05, 2011
Sony Music Brazil Gets defaced ! A Sony Entertainment website just got hacked. A group of hackers by name “ The UnderTakers ” were able to take down Sony Music Brazil, which is down for more than 12 hours now. Looks like they don’t even know about it yet, as the “ Hacked The UnderTaker ” message left by the breachers on sonymusic.com.br , is still intact. The Sony network and its services got hacked more than a dozen times over a period of 2 months. Quite alarming it is for everyone, but the company is yet to learn from its mistakes. Check Here It’s pretty apparent to everyone that Sony hasn’t plugged holes yet, and has failed to be alert.
cyber security

2026 Cloud Threats Report

websiteWizCloud Security / Threat Landscape
80% of cloud breaches still start with the basics - and AI is making them faster. Get insights into the patterns behind today's cloud attacks.
cyber security

Pentest Like Attackers Actually Do. SEC560 at SANSFIRE 2026

websiteSANS InstituteLive Training / Cybersecurity
From Kerberoasting to domain dominance—SEC560 covers the full kill chain. Washington, D.C., July 13.
John The Ripper 1.7.7 Jumbo 5 - Latest Release Download

John The Ripper 1.7.7 Jumbo 5 - Latest Release Download

Jun 04, 2011
John The Ripper 1.7.7 Jumbo 5 - Latest Release Download New version of John The Ripper has been released, John the Ripper is a free password cracking software tool. Initially developed for the UNIX operating system, it currently runs on fifteen different platforms (11 architecture-specific flavors of Unix, DOS, Win32, BeOS, and OpenVMS). It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various UNIX flavors. John the Ripper Pro currently supports the following password hash types (and more are planned): Traditional DES-based Unix crypt – most commercial Unix systems (Solaris, AIX, …), Mac OS X 10.2, ancient Linux and *BSD “bigcrypt” – HP-UX, Tru64 / Digital Unix / OSF/1 BSDI-style extended DES-based crypt – BSD...
THN Report : ACER hacked because of their own stupidity !

THN Report : ACER hacked because of their own stupidity !

Jun 04, 2011
THN Report : ACER hacked because of their own stupidity ! Yes ! you read right , ACER hacked because of their own stupidity. Yesterday we report that Pakistan Cyber Army hacked Acer Europe Server and 40,000 Users Data, Source Codes & Server Compromised . Today we investigate on this and try to find out that how exactly Pakistan hackers got the FTP access . Here in above image you can see the screenshot taken by us from a ASP forum of Acer-Euro. Acer ASP Support Team posted some Hot Fix Release and give FTP access to other members , so that they can download that Hot Fix. This was posted on January 11, 2008 . Pakistan hackers got this and explore the FTP and In  "PB" directory they get "Country Wise Customer Data.zip" file,  which include the 40000 users data managed according to country wise.  Now this Data breach is only because of ACER's own Stupidity. The link of Forum post is " http://asp.acer-euro.com/FORUM/Topic472-8-1.aspx ".
Expert Insights Articles Videos
Cybersecurity Resources