-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Make Your Own Real Android Robot !

Make Your Own Real Android Robot !

Mar 08, 2011
Android's little green robot mascot is pretty cute. Even one of Apple's biggest fans could admit he's cooler than a slightly bitten fruit. So seeing how commonly hacked Android is, when Instructables member Tanabata decided to hack a figurine to make it responsive--the Android robot is, of course, the natural choice. Tanabata's Mechanized Android Figure moves its head, displays light patterns, reacts to sound, and can send out messages in morse code. His model is from DYZPLASTIC, but you could use this hack on and figurine you have lying around that you don't mind altering. From there. you're going to need a whole lot of supplies--think four types of LED and resistors, plastic and metal micro servos, a Piezo and power supply to name but a few. Fortunately the full instructions and shopping list (with links!) are available on Instuctables to follow. After a bit of wiring (remembering to keep things small) all the gear up, then prising open the firgurine to ad...
Most Websites Vulnerable To Attack !

Most Websites Vulnerable To Attack !

Mar 08, 2011
The average website has serious vulnerabilities more than nine months of the year, according to a new report issued yesterday. According to a study issued by researchers at WhiteHat Security, the average site is exposed about 270 days of the year. "Information Leakage" has replaced Cross-Site Scripting (XSS) as the most common website vulnerability, the report says. The report examined data from more than 3,000 websites across 400 organizations that are continually tested for vulnerabilities by WhiteHat Security's Sentinel service. The study offers a look at sites' "Window of Exposure," which measures not only the vulnerabilities found in sites, but the length of time it takes those vulnerabilities to be remediated. "It's inevitable that websites will contain some faulty code -- especially in sites that are continually updated. Window of Exposure is a useful combination of the vulnerability prevalence, the time it takes to fix vulnerabilities, and...
Hacker sends teen's half-naked photo to Facebook, e-mail contacts !

Hacker sends teen's half-naked photo to Facebook, e-mail contacts !

Mar 08, 2011
BREMERTON  — The partially naked photograph of a Bremerton teenager has managed to circulate to her e-mail contacts, teachers and even to colleges where she'd applied to school, according to Bremerton police reports. The girl said she'd sent a picture of herself wearing only underwear to her boyfriend about six months ago, police said. Recently, her computer has had problems and she believes it may have been hacked. She then discovered the photo, which was on the computer, had gone out to her e-mail contacts and asked police to investigate. Bremerton detectives are on the case. Anyone with information is asked to call 911.
cyber security

Military Appreciation Month: 10% Off SANS Cybersecurity Training

websiteSANS InstituteCybersecurity Training
Get 10% off SANS training this May—online or in person. Use code MILITARY10. U.S. only.
cyber security

The Validation Gap: What Automated Pentesting Alone Cannot See

websitePicus SecurityAutomated Pentesting / Exposure Validation
This free guide maps the structural blind spots and gives you 3 diagnostic questions for any vendor conversation.
More than 150 French Government systems hacked !

More than 150 French Government systems hacked !

Mar 08, 2011
The French Ministry of Finance was hit by an unprecedented cyber attack in December, with over 150 computers compromised, according to reports. Hackers got their hands on documents related to the current French presidency of the G20 and international economic affairs, Paris Match reported. Patrick Pailloux, the executive director of l’ANSSI (Agence Nationale de la Securite des Systemes d’Information), said it was the first time the French state had been targeted by an attack of this scale. Pailloux also revealed other French Government departments had been targeted. The hackers used a Trojan to infiltrate systems, having sent emails to French Government workers, using what appeared to be standard social engineering tactics. Pailloux said an operation had been carried out to improve defences at the Government department. There have been rumblings the attack came from China, although no solid proof has emerged. “I can say that we know of hacker groups in China specialising in t...
North Korea Trains Up Hacker Squad !

North Korea Trains Up Hacker Squad !

Mar 08, 2011
Concerns about North Korea's cyber warfare squads are resurfacing after Friday's cyber and GPS jamming attacks, which are being blamed on the North. Pyongyang began developing electronic warfare capabilities in 1986 when it founded Mirim University, the present-day Automation University, to train specialists. A defector who graduated from the university recalled that 25 Russian professors were invited from the Frunze Military Academy in the former Soviet Union to give lectures, and some 100 to 110 hackers were trained there every year.  Mirim is a five-year college. The Amrokgang College of Military Engineering, the National Defense University, the Air Force Academy and the Naval Academy are also reportedly training electronic warfare specialists.  Jang Se-yul of North Korean People's Liberation Front, an organization of former North Korean military officers and servicemen, recalled that when he fled the North in 2007, "I heard that the North Korean military has about ...
How to join Anonymous Hacker - Identity less Cyber Heroes ?

How to join Anonymous Hacker - Identity less Cyber Heroes ?

Mar 08, 2011
How to join  Anonymous Hacker - Identity less Cyber Heroes  ? We have a long fight ahead of us. lets work toward a better world together. together we can do what our elected officials refuse to do. make the world a better place. We Are Legion. Expect Us. Protect your identity :  Click Here HOW TO JOIN ANONYMOUS - A BEGINNER'S GUIDE Preface: So you want to join Anonymous? You can not join Anonymous. Nobody can join Anonymous. Anonymous is not an organization. It is not a club, a party or even a movement. There is no charter, no manifest, no membership fees. Anonymous has no leaders, no gurus, no ideologists. In fact, it does not even have a fixed ideology. All we are is people who travel a short distance together - much like commuters who meet in a bus or tram: For a brief period of time we have the same route, share a common goal, purpose or dislike. And on this journey together, we may well change the world. Nobody can speak for Anonymous. Nobody ...
Iran Welcomes Hackers Who Work For Islamic Republic !

Iran Welcomes Hackers Who Work For Islamic Republic !

Mar 08, 2011
An official with Iran’s Revolutionary Guard has said that Iran welcomes hackers who are willing to work for the Islamic Republic.  “Regarding the cyber issue, we welcome the presence of those hackers who are willing to work for the goals of the Islamic Republic with good will and revolutionary activities,” said Brigadier General Gholamreza Jalali, adding that those hackers who he said are working against people will be dealt with. Jalali, who heads the country’s Passive Defense Organization, made the comments in an  interview with “Bultannews,”  a website said to be close to the Intelligence Ministry. Was Jalali trying to recruit new staff for the “Iranian Cyber Army” or for Iran’s newly launched cyber police? Or for a new entity called the “Cyber War Base “? Jalali said the "base" will be launched in the near future and will fight against cyber attacks. The  Iranian Cyber Army  has been responsible for hacking and bringing down a number of websites in ...
Expert Insights Articles Videos
Cybersecurity Resources