#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Launching Wireless Hacking Series for Fun and Profit

Launching Wireless Hacking Series for Fun and Profit

Oct 14, 2011
Launching Wireless Hacking Series for Fun and Profit THN is launching a Wireless Hacking series of blog posts where we will talk about a lot of tools and techniques. We hope this will be fun and informational for all of our readers. The series will be based on the SecurityTube Wireless Security Expert (SWSE) course material. We spoke about it in previous blog posts and loved the course material, and also SecurityTube's spirit of providing the entire course material free and only charging if you are interested in getting certified. As a responsible disclosure, we would like to inform you that we have subscribed to the SWSE course and certification. Once we registered we received the course slides and login to the student portal. This post is a short summary of the study path for the course. The student portal provides a structured path for learning: You can download the course slides, the full course material and watch the welcome video (embedded in the end). Each les...
Hcon’s Security Testing Framework (Hcon STF) v0.1beta

Hcon's Security Testing Framework (Hcon STF) v0.1beta

Oct 14, 2011
Hcon's Security Testing Framework (Hcon STF) v0.1beta After the first demo of Hfox, many people asked about a Chromium based framework for penetration testing/ethical hacking.  After 3 months of work and research, and some input from AJ, the following tool has been developed for the arsenal of Hcon's tools: Specifications 1.         Based on Chromium Source (iron build) version 14. 2.         Works for ever need of hacking/penetration testing such as recon, enumeration, social engineering, exploitation, vulnerability assessment, anonymity, mobile tools, and reporting. 3.         More secure and tracking free from Google and Stable than other Chromium-based builds. 4.         Over 100 tools integrated with easy-to-use interface. 5.         Tested and heavily modified tools with suggestions contribute...
Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

Oct 14, 2011
Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars FEDERAL officials on Wednesday arrested a 35-year-old Florida man, Christopher Chaney  and charged him with 26 counts of cyber-related crimes against Hollywood stars following an 11-month federal probe dubbed "Operation Hackerazzi". Twitter was ablaze earlier today with messages claiming to link to naked pictures of film actress Scarlett Johansson, which were allegedly stolen from her iPhone by a hacker earlier this year.The photographs may or may not be of Scarlett Johansson, but I would suggest that every hot-blooded male exercises some restraint as it's extremely possible that cybercriminals might exploit the interest to post dangerous links on the web designed to infect computers or steal information. To gain access to these email accounts, Chaney would search through details of celebrity lives within magazines as well as social media accounts like Twitter and figure ...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Continuously Monitor Your Cyber Insurance Requirements

websitePreludeSecurity Control Validation
Quickly spot the critical control gaps that mean the difference between a successful claim or losing millions.
[Contest] Win "Ghost in the Wires" Book by Kevin Mitnick

[Contest] Win "Ghost in the Wires" Book by Kevin Mitnick

Oct 12, 2011
[Contest] Win " Ghost in the Wires " Book by Kevin Mitnick Some call him a saint, some a criminal, others adore him. Industry may loathe him but we here at The Hacker News say, " Get ready, loyal subscribers! " Enter our newest contest and win a copy of Kevin Mitnick's new book titled, " Ghost in the Wires ." Fellow hackers will be pleased to know that to celebrate the release of his book,  Kevin Mitnick  has teamed up with  The Hacker News  and is giving away 3 copies of the book to our readers who submit the coolest, keenest and most appealing comments or reviews about the book. Mitnick is no less than a genius as he knits a story of intrigue and suspense as he navigates through the mazes of high tech companies keeping them jumping and realizing they are not invincible……not even close. How you can be one of the Lucky Winners? Does this sound like something you might be interested in? All you need to do is head on over to the book page:   He...
Phoenix Exploit’s Kit 2.8 mini version

Phoenix Exploit's Kit 2.8 mini version

Oct 12, 2011
Phoenix Exploit's Kit 2.8 mini version Back in April of this year, we reported the leak of  Phoenix Exploit Kit 2.5 .  The version currently in circulation is 2.8, and despite its lower activity for the last half of this year, it remains one of the preferred exploit packs used by cyber-criminals. In comparison to the Black Hole Exploit Pack, the PEK has a similar licensing model.  The last version released offered an "alternative" to purchasing the exploit pack.  This "alternative" is the Phoenix Exploit's Kit 2.8 mini. The current licensing model consists of the following: ·           Simple Domain (Closed) – USD $2,200.00 ·           Multithreaded Domain (Closed) – USD $2,700.00 ·           Extra-Encryption Service (ReFUDing) – USD $40.00 The mini version does not change the characteristics of the Exploit P...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>