-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Armitage 07.12.11 - Updated Version

Armitage 07.12.11 - Updated Version

Jul 15, 2011
Armitage 07.12.11 - Updated Version Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. This is the official change log : Fixed a race condition causing some file browser actions to fail on Windows hosts at times. Files downloaded through file browser are now archived in: [host]Downloads Hail Mary output nows goes to [log dir]allhailmary.log Added Crack Passwords button to Credentials tab. This opens the launcher for John the Ripper: auxiliary/analyze/jtr_crack_fast Added Post Modules item to Meterpreter N -> Explore and Shell N menus. This menu item will show applicable post-exploitation modules in the module browser. Loot browser now...
Pentagon Admits to biggest ever data breach

Pentagon Admits to biggest ever data breach

Jul 15, 2011
Pentagon Admits to biggest ever data breach According to Report, Department of Defense and Pentagon is disclosing news of the one of the largest data loss events to date . From investigation, officials to believe the intrusion was orchestrated by a foreign government. The theft of around 24,000 sensitive Pentagon documents occurred in March 2011. From the Associated Press: The Pentagon is revealing that it suffered one of its largest-ever losses of sensitive defense data this spring to a cyber attack that it blames on an unspecified foreign government. The loss is an example of why the Pentagon has developed new cyber security rules that emphasize deeper defenses, more collaboration with private industry and new steps to stop thefts by malicious insiders.  William Lynn, the deputy secretary of defense, said in a speech outlining the new strategy that 24,000 files were stolen from a defense industry computer network in a single intrusion in March. He offered no details....
UK Vodafone Phone Hacking method exposed

UK Vodafone Phone Hacking method exposed

Jul 14, 2011
UK Vodafone Phone Hacking method exposed The Hacker's Choice announced a security problem with Vodafone's Mobile Phone Network today. An attacker can listen to any UK Vodafone customer's phone call. An attacker can exploit a vulnerability in 3G/UMTS/WCDMA - the latest and most secure mobile phone standard in use today. Vodafone released its femto cell to the general public. This means anyone can run his own UMTS network in his house. The box connects back via your DSL connection into their mobile network. This is an initial project to gather information about the technology and verify the security. This project started in 2009 together with hackers from the french underground. Read Complete Details Here
cyber security

Military Appreciation Month: 10% Off SANS Cybersecurity Training

websiteSANS InstituteCybersecurity Training
Get 10% off SANS training this May—online or in person. Use code MILITARY10. U.S. only.
cyber security

The Validation Gap: What Automated Pentesting Alone Cannot See

websitePicus SecurityAutomated Pentesting / Exposure Validation
This free guide maps the structural blind spots and gives you 3 diagnostic questions for any vendor conversation.
PuTTY v.0.61 New Version released After 4 years

PuTTY v.0.61 New Version released After 4 years

Jul 14, 2011
PuTTY v.0.61  New Version   released  After 4 years After four Years, Putty's New version finally Released today.Here are the PuTTY files themselves: PuTTY (the Telnet and SSH client itself) PSCP (an SCP client, i.e. command-line secure file copy) PSFTP (an SFTP client, i.e. general file transfer sessions much like FTP) PuTTYtel (a Telnet-only client) Plink (a command-line interface to the PuTTY back ends) Pageant (an SSH authentication agent for PuTTY, PSCP, PSFTP, and Plink) PuTTYgen (an RSA and DSA key generation utility). These features are new in beta 0.61 Kerberos/GSSAPI authentication in SSH-2. Local X11 authorisation support on Windows. (Unix already had it, of course.) Support for non-fixed-width fonts on Windows. GTK 2 support on Unix. Specifying the logical host name independently of the physical network address to connect to. Crypto and flow control optimisations. Support for the zlib@openssh.com SSH-2 compression method. Support for new Wind...
RootRepeal – Rootkit Detector v1.3.5 Download Now

RootRepeal – Rootkit Detector v1.3.5 Download Now

Jul 13, 2011
RootRepeal – Rootkit Detector v1.3.5 Download Now RootRepeal is a new rootkit detector currently in public beta.  It is designed with the following goals in mind: Easy to use – a user with little to no computer experience should be able to use it. Powerful – it should be able to detect all publicly available rootkits. Stable – it should work on as many different system configurations as possible, and, in the event of an incompatibility, not crash the host computer. Safe – it will not use any rootkit-like techniques (hooking, etc.) to protect itself. Currently, RootRepeal includes the following features: Driver Scan – scans the system for kernel-mode drivers.  Displays all drivers currently loaded, and shows if a driver has been hidden, and whether the driver’s file is visible on-disk. Files Scan – scans any fixed drive on the system for hidden, locked or falsified* files. Processes Scan – scans the system for processes.  Displays all processes currently r...
Toshiba Database hacked and User accounts leaked by V0iD

Toshiba Database hacked and User accounts leaked by V0iD

Jul 12, 2011
Toshiba Database hacked and User accounts leaked by V0iD Today V0iD hacker leak the database of  National Assembly of Pakistan database  and now he also Hack the website of  Toshiba  .  The Database names, Admin user table data with user-passwords and Normal users logins leaked at  http://pastebin.com/mFwijETu  . And also He leak Service Places of Toshiba. These are a small list of Toshiba resellers accounts with their passwords at  http://pastebin.com/ay4981Tp  . The Databases List Provide by hacker : Master Tempdb Model Msdb Concierge_desk QuickFix Cds Crb CompChart TACPSERVICE TamsIntranet2008 BlogEngine TIMSS
National Assembly of Pakistan database hacked by V0iD

National Assembly of Pakistan database hacked by V0iD

Jul 12, 2011
National Assembly of Pakistan database hacked by V0iD Another new hacker "V0iD" come in action ! He hack the website and database of National Assembly of Pakistan at  http://www.na.gov.pk  . The hacked database info is leaked at  http://pastebin.com/bAgnnG9F  . Hacker leaks the username / passwords of 7 admin accounts and phone numbers of 13 accounts.
Expert Insights Articles Videos
Cybersecurity Resources