#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

The Undead  “Corporations” by Patti Galle

The Undead "Corporations" by Patti Galle

Jan 18, 2012
The Undead  "Corporations" by Patti Galle  The Hacker News Editor " Patti Galle " share her views about Corporations in THN Magazine December Edition . We would like to share same article with our blog Readers. Enjoy the interesting read : Corporations are soulless entities possessing privileges and the rights of citizenship that actual people have; all the while not having to shoulder any of the natural responsibilities. Undead Corporations have concentrated the essence of avarice, rage and fury to form their corporate structure. And as these covetous Corporations have accumulated immeasurable wealth they have methodically utilized this wealth and power to procure, infiltrate, and seize control of the influential and powerful American government and many governments across the world vigorously fusing them into a globe-encompassing non-living aberration, now rightfully called or labeled as Corporatocracy. At present, on an ever escalating level, world governments ar...
SP Toolkit - Open Source Phishing Education Toolkit

SP Toolkit - Open Source Phishing Education Toolkit

Jan 18, 2012
SP Toolkit - Open Source Phishing Education Toolkit A new open source toolkit makes it ridiculously simple to set up phishing Web sites and lures. The software was designed to help companies test the phishing awareness of their employees, but as with most security tools, this one could be abused by miscreants to launch malicious attacks. The spt project is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. Organizations spend billions of dollars annually in an effort to safeguard information systems, but spend little to nothing on the under trained and susceptible minds that operate these systems, thus rendering most technical protections instantly ineffective. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.spt was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patc...
Indian BJP Politician's bank accounts hacked

Indian BJP Politician's bank accounts hacked

Jan 18, 2012
Indian BJP Politician 's bank accounts hacked A local News paper today reported that ,The four axis bank accounts belonging to city's Ganesh Shipping firm were hacked by unknown persons and Rs 4, 00,100 was transferred to a different account of Moradabad and Sind Bank. Following a complaint by Shetty, Bunder North Police Inspector Vinay Goankar ensured that the Moradabad account was frozen by informing bank authorities there. Investigation in Process.
cyber security

Stop Lateral Movement Now

websiteElisityIdentity Security / Microsegmentation
Download your expert's buying checklist
cyber security

Make the Most of the Security Tools You Already Have

websitePelude SecurityThreat Management
Identify critical gaps and misconfigurations in your security tools with Prelude's 14-day free trial.
The Cloud Security Rules Book - Technology is your friends & Enemy

The Cloud Security Rules Book - Technology is your friends & Enemy

Jan 18, 2012
The Cloud Security Rules Book - Technology is your friends & Enemy Well-known security experts decipher the most challenging aspect of cloud computing-security.  The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. According to Description available on official site " This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO of a well-known brand - this book brings you relevant knowledge about security in the Cloud.This book helps you to understand the differences and the similarities between cloud computing and traditional networking - which in essence is the same, yet different. If you are considering moving to the cloud, or are looking for a higher level of security for your existing appliance, The Cloud Security Rules help you to choose the right level of security - based on your needs and understanding ." As the most current and comp...
No Turning Back ~ 2012 by Patti Galle

No Turning Back ~ 2012 by Patti Galle

Jan 16, 2012
No Turning Back ~ 2012 by Patti Galle Patti Galle , from The Hacker News Editorial Staff wrote an Article in THN Magazine January Edition . We would like to share this read with all of our site readers. Rebellions are most always rooted in a call for justice, decency and morality. World history is full of countless rebellions against despots and others who did not conform to the will of the people. And as inequality grows to absurd new heights around the world and institutions of power are considered fundamentally dishonest, corrupt, and leaders no longer command the respect and confidence of the people then you have societies where social upheaval is inevitable. Rebellions spring up against fraudulent power and authority, and it is grounded in real outrage against mass murder (neo-imperialism, neo-colonialism), violation of human rights (torture, war crimes), widespread lying and hypocrisy, endemic political corruption, unrestrained thirst for money and power, and unprecedented ...
Wireless Penetration Testing Series Part 2: Basic concepts of WLANs

Wireless Penetration Testing Series Part 2: Basic concepts of WLANs

Jan 16, 2012
Wireless Penetration Testing Series Part 2: Basic concepts of WLANs This blog post is in continuation of the Wireless Penetration Testing and Hacking series we started ( Part 1: Getting Started with Monitoring and Injection ) on the basis of the "SecurityTube Wi-Fi Security Expert" ( SWSE ) course which is based on the popular book " Backtrack 5 Wireless Penetration Testing ". In the third video, the instructor talks about some of the basic concepts of WLANs. We learn that communication over WLAN's happens over frames. There are mainly 3 types of WLAN frames which are Management frames, Control frames, and Data frames. These types of packets also have different subtypes . We learn that an SSID is a name given to an Access point or a network consisting of multiple Access points. We then learn about Beacon frames which are broadcast frames sent out periodically by Access point to broadcast their presence in the current RF (Radio frequency) vicinity. The instructor then starts wire...
Expert Insights Articles Videos
Cybersecurity Resources