#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

UK Vodafone Phone Hacking method exposed

UK Vodafone Phone Hacking method exposed

Jul 14, 2011
UK Vodafone Phone Hacking method exposed The Hacker's Choice announced a security problem with Vodafone's Mobile Phone Network today. An attacker can listen to any UK Vodafone customer's phone call. An attacker can exploit a vulnerability in 3G/UMTS/WCDMA - the latest and most secure mobile phone standard in use today. Vodafone released its femto cell to the general public. This means anyone can run his own UMTS network in his house. The box connects back via your DSL connection into their mobile network. This is an initial project to gather information about the technology and verify the security. This project started in 2009 together with hackers from the french underground. Read Complete Details Here
PuTTY v.0.61 New Version released After 4 years

PuTTY v.0.61 New Version released After 4 years

Jul 14, 2011
PuTTY v.0.61  New Version   released  After 4 years After four Years, Putty's New version finally Released today.Here are the PuTTY files themselves: PuTTY (the Telnet and SSH client itself) PSCP (an SCP client, i.e. command-line secure file copy) PSFTP (an SFTP client, i.e. general file transfer sessions much like FTP) PuTTYtel (a Telnet-only client) Plink (a command-line interface to the PuTTY back ends) Pageant (an SSH authentication agent for PuTTY, PSCP, PSFTP, and Plink) PuTTYgen (an RSA and DSA key generation utility). These features are new in beta 0.61 Kerberos/GSSAPI authentication in SSH-2. Local X11 authorisation support on Windows. (Unix already had it, of course.) Support for non-fixed-width fonts on Windows. GTK 2 support on Unix. Specifying the logical host name independently of the physical network address to connect to. Crypto and flow control optimisations. Support for the zlib@openssh.com SSH-2 compression method. Support for new Wind...
RootRepeal – Rootkit Detector v1.3.5 Download Now

RootRepeal – Rootkit Detector v1.3.5 Download Now

Jul 13, 2011
RootRepeal – Rootkit Detector v1.3.5 Download Now RootRepeal is a new rootkit detector currently in public beta.  It is designed with the following goals in mind: Easy to use – a user with little to no computer experience should be able to use it. Powerful – it should be able to detect all publicly available rootkits. Stable – it should work on as many different system configurations as possible, and, in the event of an incompatibility, not crash the host computer. Safe – it will not use any rootkit-like techniques (hooking, etc.) to protect itself. Currently, RootRepeal includes the following features: Driver Scan – scans the system for kernel-mode drivers.  Displays all drivers currently loaded, and shows if a driver has been hidden, and whether the driver's file is visible on-disk. Files Scan – scans any fixed drive on the system for hidden, locked or falsified* files. Processes Scan – scans the system for processes.  Displays all processes currently r...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
cyber security

AI Can Personalize Everything—Except Trust. Here's How to Build It Anyway

websiteTHN WebinarIdentity Management / AI Security
We'll unpack how leading teams are using AI, privacy-first design, and seamless logins to earn user trust and stay ahead in 2025.
Toshiba Database hacked and User accounts leaked by V0iD

Toshiba Database hacked and User accounts leaked by V0iD

Jul 12, 2011
Toshiba Database hacked and User accounts leaked by V0iD Today V0iD hacker leak the database of  National Assembly of Pakistan database  and now he also Hack the website of  Toshiba  .  The Database names, Admin user table data with user-passwords and Normal users logins leaked at  https://pastebin.com/mFwijETu  . And also He leak Service Places of Toshiba. These are a small list of Toshiba resellers accounts with their passwords at  https://pastebin.com/ay4981Tp  . The Databases List Provide by hacker : Master Tempdb Model Msdb Concierge_desk QuickFix Cds Crb CompChart TACPSERVICE TamsIntranet2008 BlogEngine TIMSS
National Assembly of Pakistan database hacked by V0iD

National Assembly of Pakistan database hacked by V0iD

Jul 12, 2011
National Assembly of Pakistan database hacked by V0iD Another new hacker "V0iD" come in action ! He hack the website and database of National Assembly of Pakistan at  https://www.na.gov.pk  . The hacked database info is leaked at  https://pastebin.com/bAgnnG9F  . Hacker leaks the username / passwords of 7 admin accounts and phone numbers of 13 accounts.
Project Tarmeggedon by Anonymous Hackers Operation Green Rights

Project Tarmeggedon by Anonymous Hackers Operation Green Rights

Jul 12, 2011
Project Tarmeggedon by Anonymous Hackers Operation Green Rights Anonymous hackers Starts Project Tarmeggedon , Presents by Operation Green Rights. Hackers calling everyone to Protest. Press Release By Anonymous Hackers : Free-thinking citizens of the world: Anonymous' Operation Green Rights calls your attention to an urgent situation in North America perpetuated by the boundless greed of the usual suspects: Exxon Mobil, ConocoPhillips, Canadian Oil Sands Ltd., Imperial Oil, the Royal Bank of Scotland, and many others. This week, activists are gathering along U.S. Highway 12 in Montana to protest the transformation of a serene wilderness into an industrial shipping route, bringing "megaloads" of refinery equipment to the Alberta Tar Sands in Canada (see Tar Sands FAQ Sheet below). Anonymous now joins the struggle against "Big Oil" in the heartland of the US. We stand in solidarity with any citizen willing to protest corporate abuse. Anonymous will not s...
Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution

Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution

Jul 12, 2011
Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution The single Critical vulnerability in today's batch of security updates addresses an issue in the Bluetooth stack. Your workstations' risk to this vulnerability varies, depending on a number of factors. I'd like to use this blog post to outline those risk factors. This security update resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. This security update is rated Critical for all supported editions of Windows Vista and Windows 7. For more information, see the subsection, Affected and Non-Affected Software, in this section. The security update addresses the...
Expert Insights Articles Videos
Cybersecurity Resources