#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Chinese spied on NATO officials using Facebook Friends

Chinese spied on NATO officials using Facebook Friends

Mar 12, 2012
Chinese spied on NATO officials using Facebook Friends An online scam has been exposed in which senior British military and government officials were tricked into becoming Facebook friends with someone masquerading as U.S. Admiral James Stavridis, NATO's Supreme Allied Commander and lead officer on the Libyan mission, thereby exposing their own personal information to unknown hackers. Late last year, senior British military officers, Defense Ministry officials, and other government officials were tricked into becoming Facebook friends with someone masquerading as United States Navy admiral James Stavridis. Nato will not officially say who was behind the cyber-fraud or who accepted friend requests but it is understood that evidence points to Chinese state-sponsored hackers. NATO has advised senior officers and officials, including Admiral Stirvis to open their own social networking pages to prevent a repeat of such incident. the Supreme Headquarters Allied Powers Europe (Shape...
[POC] Buffer Overflow Vulnerability in GOM Media Player v. 2.1.37

[POC] Buffer Overflow Vulnerability in GOM Media Player v. 2.1.37

Mar 11, 2012
Buffer Overflow Vulnerability in GOM Media Player v. 2.1.37 Ucha Gobejishvili (longrifle0x)  from The Vulnerability Laboratory Research Team  discover Buffer Overflow Vulnerability in GOM Media Player v. 2.1.37. GOM Player (Gretech Online Movie Player) is a 32/64-bit media player for Microsoft Windows, distributed by the Gretech Corporation of South Korea. A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In this case, The vulnerability can be exploited by local or remote attackers and Vulnerable module is GomU+0x125cb7. ...
Call for Article - THN Magazine "Cyber Warfare" April Issue

Call for Article - THN Magazine "Cyber Warfare" April Issue

Mar 10, 2012
Call for Article - THN Magazine "Cyber Warfare" April Issue As we move through March Madness and the recent arrests of our cyber soldiers, it is time for all good Anons and our faithful readers to take keyboards to Word and send in your articles on the topic of CYBER WARFARE. What do you know of this unconventional method of taking down governments and corporations and what does this mean for the world at large?   Send your articles to  admin@thehackernews.com
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
Symantec's Norton anti-virus 2006 source code Leaked by Anonymous

Symantec's Norton anti-virus 2006 source code Leaked by Anonymous

Mar 10, 2012
Symantec's Norton anti-virus 2006 source code Leaked by Anonymous Security firm Symantec confirmed Friday that the hacker group Anonymous has just posted some of its product source code, but strongly downplays any risk, because it's old code from a 2006 version of Norton security software. Anonymous claimed to have the information for a while but they finally published it on The website Pirate Bay . The information is a source code for the Symantec Norton Antivirus 2006 edition,which includes files that serve as a source code for software products like the corporate edition, the consumer version, and files for NetWare, Windows and Unix. The download file is 1.07GB. The file has a note that asks for the liberation of the LulzSec members that were arrested. Symantec the anti-virus and Security Company previously stated that the breach will " not affect any current Norton product ". Then added: " The current version of Norton Utilities has been completely rebuilt and shares ...
'The New York Iron Works' police supplier Hacked by Anonymous

'The New York Iron Works' police supplier Hacked by Anonymous

Mar 10, 2012
' The New York Iron Works ' police supplier Hacked by Anonymous Anonymous Hackers with the Antisec movement have attacked the site of a company that sells equipment to US law enforcers such as the police. Members of Anonymous recently hacked the official site for law enforcement equipment supplier New York Iron Works . Defaced page include the message, " To our fallen brothers Your work has not been forgotten, your skills and teachings has spawn another generation of an elite squander. Like the knights at the round table, we have shared may common interests but let us not forget the game we play. AntiSec is still alive and well ,". The leaked data includes usernames, clear-text passwords and email addresses. The message posted to the New York Ironwork's homepage called the attack a " tribute to Jeremy Hammond ," the LulzSec member arrested in Chicago on Monday and one of the men responsible for the attack on the intelligence firm Stratfor on December 25 last year....
Expert Insights Articles Videos
Cybersecurity Resources
//]]>