#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Smart Hacking For Privacy : What TV shows you watch ?

Smart Hacking For Privacy : What TV shows you watch ?

Jan 09, 2012
Smart Hacking For Privacy : What TV shows you watch ? White-hat hackers have exposed the privacy shortcomings of smart meter technology. At the Chaos Communication Congress in Germany, 28C3, researchers presented " Smart Hacking For Privacy " After analyzing data collected by a smart meter, these gentlemen were able to determine devices like how many PCs or LCD TVs in a home, what TV program was being watched, and if a DVD movie being played had copyright-protected material. Dario Carluccio and Stephan Brinkhaus demonstrated the flaws. Advanced metering devices (aka smart meters) are nowadays being installed throughout electric networks in Germany, in other parts of Europe and in the United States. Due to a recent amendment especially in Germany they become more and more popular and are obligatory for new and refurbished buildings. DarrellIssa The researchers, also customers, learnt that energy consumption data was sent unencrypted because SSL was malfunctioning.They int...
Hey @BarackObama ! Please don't extradite Gary McKinnon, CC : @Number10gov

Hey @BarackObama ! Please don't extradite Gary McKinnon, CC : @Number10gov

Jan 08, 2012
Hey @BarackObama ! Please don't extradite Gary McKinnon Gary McKinnon,  a Scottish systems administrator and hacker who has been accused of what one U.S. prosecutor claims is the " biggest military computer hack of all time " by hacking into the Pentagon, faces an ordeal of terrifying brutality if he is extradited to the United States. America wants to put him on trial, and if tried there he could face 60 years behind bars. Note : Request to Every Reader ! Please Re-Tweet/Share this article if you want to Support Gary McKinnon in the fight for justice. The mother Gary McKinnon has called for her son to stand trial in Britain claiming attempts to extradite him to the US have destroyed his life. He claims his motivation, drawn from a statement made before the Washington Press Club on 9 May 2001 by " The Disclosure Project ", was to find evidence of UFOs, antigravity technology, and the suppression of " free energy ", all of which he claims to have ...
Anonymous expose email addresses of British military staff & Nato officials

Anonymous expose email addresses of British military staff & Nato officials

Jan 08, 2012
Anonymous expose email addresses of British military staff & Nato officials Anonymous Hackers expose email addresses of 221 British military staff with encrypted passwords, including those of defence, intelligence and police officials as well as politicians and 242 Nato advisers. " Civil servants working at the heart of the UK government including several in the Cabinet Office as well as advisers to the Joint Intelligence Organisation, which acts as the prime minister's eyes and ears on sensitive information have also been exposed ." from  Guardian  .
cyber security

Accelerate Your Zero Trust Strategy

websiteElisityIdentity Security / Microsegmentation
Download your guide on how to compare vendors and select the right microsegmentation solution
cyber security

Make the Most of the Security Tools You Already Have

websitePelude SecurityThreat Management
Identify critical gaps and misconfigurations in your security tools with Prelude's 14-day free trial.
XSS vulnerability reported in Yahoo subdomain website

XSS vulnerability reported in Yahoo subdomain website

Jan 08, 2012
XSS vulnerability reported in Yahoo subdomain website Vansh Sharma & Vaibhuv Sharma from India Reported another important Cross site scripting XSS vulnerability in Yahoo subdomain as shown. Vulnerable Link :  https://au.tv.yahoo.com/plus7/royal-pains/ Cross-site scripting ( XSS ) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users.
International Conference on Cyber Security (ICCS) 2012 : Protecting the Cyber World

International Conference on Cyber Security (ICCS) 2012 : Protecting the Cyber World

Jan 08, 2012
International Conference on Cyber Security (ICCS)  2012 : Protecting the Cyber World The FBI is teaming up with Fordham University for the International Conference on Cyber Security. It's an effort to identify emerging cyber threats and develop ways to mitigate those threats. The ZeuS Trojan has infected almost 4 million computers in the United States alone. Financial losses due to the ZeuS Trojan are estimated at up to $60 million. The third annual International Conference on Cyber Security: A White Hat Summit (ICCS 2012), a joint effort between the Federal Bureau of Investigation and Fordham University, brings together global leaders from law enforcement, industry and academia at Fordham's Lincoln Center campus from January 9 through 12, 2012. The conference will include three days of lectures, panel discussions, sponsor presentations, exhibitions, and exceptional networking opportunities. ICCS 2012, a four-day event features more than 65 unique lectures from keynote...
Wireless Penetration Testing Series Part 1: Getting Started with Monitoring and Injection

Wireless Penetration Testing Series Part 1: Getting Started with Monitoring and Injection

Jan 07, 2012
Wireless Penetration Testing Series Part 1 : Getting Started with Monitoring and Injection We had promised a while back that we would start a Wireless Security and Penetration testing series based on the SecurityTube Wi-Fi Security Expert (SWSE) course! This course is based on the popular and much appreciated book – " Backtrack 5 Wireless Penetration Testing ", So here we go . In the first two videos, the instructor gets us up and running with our lab setup – access points, victim and attacker machines, wireless cards etc. We then learn that there are 2 essential concepts which one needs to be aware of when dealing with security – ability to monitor and ability to actively prevent attacks. For monitoring, we need to be able to put our wireless cards into "promiscuous mode" so that it can gather all the packets in the air. This is called monitor mode in wireless and we can do this by using a utility called airmon-ng. For active prevention, we need the ability to inject arbitrary pac...
Expert Insights Articles Videos
Cybersecurity Resources