-->
#1 Trusted Cybersecurity News Platform
Followed by 5.70+ million
The Hacker News Logo
Get the Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

The City Of Rennes (France) Hacked against Anti-Islamic government of France

The City Of Rennes (France) Hacked against Anti-Islamic government of France

Sep 19, 2011
The City Of Rennes (France) Hacked against Anti-Islamic government of France TeaMp0isoN hackers take responsibly to hack official website of The City Of Rennes (France) via a tweet . Hacker publish the reason of hack on the defacement page " This defacement is a digital protest against the banning of "Islamic" prayer in public and the banning of the burqa in France, everyone should have a right to practice their religion, you allow Christian preachers to stand in the public and preach to the public but u don't allow Muslims to pray in public? You allow women to walk around half-naked but you don't allow Muslim women to cover their body? Shame on you france, Muslims are people too... ". Mirror of hack also submitted to Zone-H directory.
BIOS based Virus discovered by Chinese Security Firm

BIOS based Virus discovered by Chinese Security Firm

Sep 19, 2011
BIOS based Virus discovered by Chinese Security Firm A Chinese AV company 360 discovered a new Trojan, the “ BMW Virus ” (also called Mebromi), that can actually infect a computers BIOS: “ BMW 360 Security Center virus is the latest catch of a high-risk virus, the virus that infected a chain BIOS (motherboard chip program), MBR (master boot drive) and Windows system files, reinstall the system, regardless of the victim computer, format the hard disk, or replace the hard disk can not completely remove the virus. ” It uses the CBROM command-line tool to hook its extension into the BIOS. The next time the system boots, the BIOS extension adds additional code to the hard drive's master boot record (MBR) in order to infect the winlogon.exe / winnt.exe processes on Windows XP and 2003 / Windows 2000 before Windows boots. The next time Windows launches, the malicious code downloads a rootkit to prevent the drive's MBR from being cleaned by a virus scanner. But even if the drive is ...
Automated Skype calls spreading fake anti-virus warning

Automated Skype calls spreading fake anti-virus warning

Sep 19, 2011
Automated Skype calls spreading fake anti-virus warning Automated Skype calls spreading fake anti-virus warning, where an automated message (what I like to call a "Digital Dorothy") warns you in a semi-robotic voice that your computer's security is not up-to-date. "Attention: this is an automated computer system alert. Your computer protection service is not active. To activate computer protection, and repair your computer, go to [LINK]," says the robotic voice during a prerecorded message. The offered link takes the most gullible and curious ones to a page that shows the typical "Computer protection inactive. Scanning… Viruses found!" message that is meant to convince them to fork over a decent amount of money - in this case, $19.95 - in order to get the offered protection.Not content with the money, they also ask for their personal information. If you weren't aware of fake anti-virus (also known as scareware) scams like this you might well...
cyber security

Military Appreciation Month: 10% Off SANS Cybersecurity Training

websiteSANS InstituteCybersecurity Training
Get 10% off SANS training this May—online or in person. Use code MILITARY10. U.S. only.
cyber security

The Validation Gap: What Automated Pentesting Alone Cannot See

websitePicus SecurityAutomated Pentesting / Exposure Validation
This free guide maps the structural blind spots and gives you 3 diagnostic questions for any vendor conversation.
NeXpose 5.0 vulnerability management solution Released by Rapid7

NeXpose 5.0 vulnerability management solution Released by Rapid7

Sep 19, 2011
NeXpose 5.0 vulnerability management solution Released by Rapid7 Nexpose proactively supports the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. This gives organizations immediate insight into the security posture of their IT environment by conducting over 65,000 vulnerability checks for more than 16,000 vulnerabilities. The solution leverages one of the largest vulnerabilities databases to identify vulnerabilities across networks, operating systems, databases, Web applications and virtual assets. Risk is classified based on real exploit intelligence combined with industry standard metrics such as CVSS, as well as temporal and weighted risk scoring. Nexpose provides a detailed, sequenced remediation roadmap with time estimates for each task. Nexpose is used to help organizations improve their overall risk posture and security readiness as well as to comply with mandatory regulati...
Military Contractor Mitsubishi hacked

Military Contractor Mitsubishi hacked

Sep 19, 2011
Military Contractor Mitsubishi hacked Mitsubishi Heavy Industries Ltd said on Monday that its computers had been hacked into, with one newspaper saying the target was Japan's biggest defence contractor's factories for submarines, missiles and nuclear power plant components. " There is no possibility of any leakage of defense-related information at this point, " a spokesman for the Japanese conglomerate said. According to the Japanese newspaper, information was stolen from the company’s computers in the attack. Mitsubishi Heavy has confirmed the attack, but said it is still investigating whether there were any information leaks.The company said about 80 virus-infected computers were found at the company’s headquarters in Tokyo as well as manufacturing and R&D sites including Kobe Shipyard & Machinery Works, Nagasaki Shipyard & Machinery Works and Nagoya Guidance & Propulsion System Works. Kobe Shipyard currently builds submarines and makes compone...
NetworkMiner 1.1 -  Network Forensic Analysis Tool (NFAT) Released

NetworkMiner 1.1 - Network Forensic Analysis Tool (NFAT) Released

Sep 19, 2011
NetworkMiner 1.1 -  Network Forensic Analysis Tool (NFAT) Released  NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames). Consider a scenario where you’re analyzing a suspicious website, wishing to understand the way that it might try attacking its visitors. One way to approach this challenge is to browse the website using a Windows ...
Intelligence and National Security Alliance (INSA) hacked

Intelligence and National Security Alliance (INSA) hacked

Sep 19, 2011
Intelligence and National Security Alliance (INSA) hacked On Wednesday, 48 hours after releasing a policy paper on cybersecurity, the top trade association for intelligence contractors got a first-hand lesson on the subject: they discovered that their website was hacked. Cryptome, a site affiliated with the hacker collective Anonymous, published the membership emails and phone numbers and in some cases home addresses for the members of the Intelligence and National Security Alliance (INSA). By clicking on a link titled, “INSA Nest of Official and Corporate Spies,” anyone can find contact information for senior officials at the NSA, FBI, and CIA, as well as top national security contracting firms like Booz Allen Hamilton. The apparent cyberattack on the Intelligence and National Security Alliance, or INSA, is the latest example of the ability of hackers to penetrate the computer systems of government agencies and private companies — including those that pride themselves on their ...
Expert Insights Articles Videos
Cybersecurity Resources