#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Two Arrested For Dropping Drugs And Porn Into Prison Using A Drone

Two Arrested For Dropping Drugs And Porn Into Prison Using A Drone

Aug 25, 2015
The use of Unmanned Aerial Vehicles (UAVs), popularly known as Drones, is rapidly transforming the way crimes are conducted, and this story helps prove this right. Maryland State Police arrested two men  –  Thaddeus Shortz and Keith Brian Russell  –   suspected of allegedly trying to smuggle drugs and porn into a state prison using a drone , according to law enforcement authorities. The men, with the intention to fly a Yuneec Typhoon drone into local jails, were arrested near the Western Correctional Institution and the North Branch Correctional Institution in Cumberland, Maryland late Saturday. The authorities seized: A Yuneec Typhoon drone , which retails for around $1,300 Synthetic marijuana (also known as " Spice ") Pornographic DVDs Tobacco Prescription drugs A mobile phone A loaded pistol However, the pistol likely was not going to be carried by the drone as it was apparently too heavy that it probably would have weighed down ...
New Android Smartphones will Come with Fewer Pre-installed Apps

New Android Smartphones will Come with Fewer Pre-installed Apps

Aug 25, 2015
A sigh of relief indeed! Google is finally listening to us; it is ditching its haunting bloatware from the upcoming Android smartphones and tablets. As per the current situation, our Android devices are attacked with Google's suite of apps like Google Play Games, Google Newsstand, Google Play Books. The new Samsung Galaxy Note 5 is expected not to be pre-occupied with Google+. Though Android is an open source platform where a user can only give their inputs, the final call is taken by Google; writes and updates Android itself. We can get our own copy from the Android Open Source Project (AOSP) repository. For this, Google has listed thorough instructions to help you build it into a fully functioning version of Android. No Space for Unwanted Apps The phone manufacturers are also given access to the Android source code for free exactly in the same way as users. They can modify and change any parts they like. However, when it comes to installing G...
Hack Leads to Extortions and Suicides! Ashley Madison puts $500,000 Bounty on Hackers' Head

Hack Leads to Extortions and Suicides! Ashley Madison puts $500,000 Bounty on Hackers' Head

Aug 25, 2015
It's been a rough week for cheating website Ashley Madison, whose slogan is " Life is short, have an affair ." Last week, the Impact Team, who claimed to hack Ashley Madison, posted 10GB of personal data for tens of Millions of its customers, including their names and email addresses. The hackers made things even worse by releasing another 20GB of company's internal data , including personal emails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman , along with the source code for Ashley Madison's website and mobile apps. However, regardless of how you respond to the Ashley Madison hack , the bottom line is that what the hackers, who called themselves The Impact Team, did was highly illegal. Not just illegal, but now the Ashley Madison hack has become a reason for suicides, blackmail and multiple cases of extortion. "Two unconfirmed reports of suicides due to #AshleyMadisonHack, says Acting Staff Superintendent Bry...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
cyber security

AI Can Personalize Everything—Except Trust. Here's How to Build It Anyway

websiteTHN WebinarIdentity Management / AI Security
We'll unpack how leading teams are using AI, privacy-first design, and seamless logins to earn user trust and stay ahead in 2025.
Microsoft Launches Cortana App For Android Users

Microsoft Launches Cortana App For Android Users

Aug 25, 2015
Yes, she is here! Android users can now talk to Cortana – the first personal digital assistant – which is a patented product of Microsoft. She is available on all the devices running Windows 10 . Earlier in May, Microsoft said they will make Cortana available for Android and iOS users . Therefore, a beta version of Cortana has been rolled out by Microsoft for public. Yesterday, Microsoft made an announcement stating the availability of Cortana for the rival Android platform. This will enable the Android phone users to replace the Google Now shortcut by pressing and holding the home button in order to activate Cortana instead. Microsoft is Opening and Spreading its Wings Everywhere Cortana maintains the same user interface and functionalities as it has in Windows devices. Now the users will get choices between whom to choose, Cortana vs. Google Now . People might like the change, as Cortana is largely appreciated by Windows users. As it is the beta relea...
Girl Hacker Devises a 3D Printed High-Heeled Shoes with Hacking Tools Inside

Girl Hacker Devises a 3D Printed High-Heeled Shoes with Hacking Tools Inside

Aug 25, 2015
Next time when you came across a lady wearing high heels, you need to Watch her steps, and yours too. What if a computer hacker with stunning good look and charm, especially a girl, walk around you? This is the only reason why a young woman hacker going under the name SexyCyborg could turn out so dangerous . SexyCyborg, a Chinese hardware hacker, is actually a very intelligent and extremely geeky woman, who has a keen interest in electronics, robotics, and most importantly 3D printing. She proved this by first creating the Hikaru Skirt   with the help of a 3D printer back in July, and now… …by devising a new way of Hiding Hi-Tech Hacking Technology in a Unique Pair of High-Heeled Shoes . 'Wu Ying Shoes' – A Set of Hacking Tools! She used a 3D-printed pair of high heels for the purpose of hiding a penetration-testing toolkit around. The 3D-printed heels, she dubbed " Wu Ying Shoes ," named after the Chinese folk hero Wong Fei Hung's...
Expert Insights Articles Videos
Cybersecurity Resources