#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Oct 15, 2011
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration] " Encipher It " One of the best and easiest AES Text encryptor for Google Mail or anything else. It Provide more secure PBKDF2 (Password-Based Key Derivation Function) key generation. It use Advanced Encryption Standard to protect your data. All encoding/decoding is performed locally in your browser. Video Demonstration by Network NUTS : Subscribe " Network Nuts " You Tube Channel for More Linux Tutorials. Try " Encipher It " Now !
Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Oct 15, 2011
Artillery 0.1 alpha  - New tool for Linux Protection by ReL1K A new Tool " Artillery " - for Linux Protection has been Released by ReL1K (Founder DerbyCon, Creator of the Social-Engineer Toolkit). It's written in Python and completely open-source. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. It's extremely light weight, has multiple different methods for detecting specific attacks and eventually will also notify you of insecure nix configurations. Features: If anyone decides to port scan or touch those ports, they are blacklisted immediately and permanently. It's multi-threaded and can handle as many connections thrown at it. Monitor file integrity leveraging sha-512 database Keeps track of all system files and if anything changes Artillery also monitors the SSH logs, and the event of a brute force attack, blacklists the host forever Extremely Simple Configuration ( /var/artillery/config ) ...
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Oct 14, 2011
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran GRAND RAPIDS – Cyber Styletto is a new novella by a journalist, a writer, and a security expert who have pooled their talents to create an enthralling good read that is future forward and predictive. The facts are based on real vulnerabilities in the way the Internet is constructed. Recent cyber security attacks using sophisticated malware (think Stuxnet) and social engineering techniques have raised the bar for defenders. Cyber Styletto pivots off these cyber events to educate and entertain. It is written as fact-based fiction. The story comes from the minds of Gian DeTorre and Mike Brennan. DeTorre is the pen name of an award winning fiction writer and literary critic whose stories and reviews have been published worldwide. " Cyber Styletto is a new genre in literature, bringing the modern, secretive world of cyber espionage together with a good, old-fashioned thriller ," DeTorre said. I hope our a...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Maximize the Security Tools You Already Have

websitePrelude SecuritySecurity Control Validation
Hone your EDR, identity, vuln, and email platforms against the threats that matter with a 14-day trial.
GateOne Beta - Terminal emulator for HTML5 web browsers

GateOne Beta - Terminal emulator for HTML5 web browsers

Oct 14, 2011
GateOne Beta - Terminal emulator for HTML5 web browsers The software makes use of WebSockets to connect a server backend written in Python and a frontend written for modern browsers in JavaScript, HTML5 and CSS. The frontend doesn't require any browser plug-ins to be installed.Gate One also supports HTTP over SSL (https) secure connections from the browser to the server and authentication technologies such as Kerberos. It has its own internal plug-in system (plug-ins can be written in Python, JavaScript and CSS); currently available plug-ins for Gate One include SSH client connections, session recording and playback, and a bookmark manager for storing terminal sessions. Top features: * No browser plugins required! * Supports multiple simultaneous terminal sessions. As many as your hardware can handle. * Users can re-connect to their running terminals whenever they like from anywhere. * Can be embedded into other applications. Add a terminal--running whatever appl...
Launching Wireless Hacking Series for Fun and Profit

Launching Wireless Hacking Series for Fun and Profit

Oct 14, 2011
Launching Wireless Hacking Series for Fun and Profit THN is launching a Wireless Hacking series of blog posts where we will talk about a lot of tools and techniques. We hope this will be fun and informational for all of our readers. The series will be based on the SecurityTube Wireless Security Expert (SWSE) course material. We spoke about it in previous blog posts and loved the course material, and also SecurityTube's spirit of providing the entire course material free and only charging if you are interested in getting certified. As a responsible disclosure, we would like to inform you that we have subscribed to the SWSE course and certification. Once we registered we received the course slides and login to the student portal. This post is a short summary of the study path for the course. The student portal provides a structured path for learning: You can download the course slides, the full course material and watch the welcome video (embedded in the end). Each les...
Hcon’s Security Testing Framework (Hcon STF) v0.1beta

Hcon's Security Testing Framework (Hcon STF) v0.1beta

Oct 14, 2011
Hcon's Security Testing Framework (Hcon STF) v0.1beta After the first demo of Hfox, many people asked about a Chromium based framework for penetration testing/ethical hacking.  After 3 months of work and research, and some input from AJ, the following tool has been developed for the arsenal of Hcon's tools: Specifications 1.         Based on Chromium Source (iron build) version 14. 2.         Works for ever need of hacking/penetration testing such as recon, enumeration, social engineering, exploitation, vulnerability assessment, anonymity, mobile tools, and reporting. 3.         More secure and tracking free from Google and Stable than other Chromium-based builds. 4.         Over 100 tools integrated with easy-to-use interface. 5.         Tested and heavily modified tools with suggestions contribute...
Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

Oct 14, 2011
Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars FEDERAL officials on Wednesday arrested a 35-year-old Florida man, Christopher Chaney  and charged him with 26 counts of cyber-related crimes against Hollywood stars following an 11-month federal probe dubbed "Operation Hackerazzi". Twitter was ablaze earlier today with messages claiming to link to naked pictures of film actress Scarlett Johansson, which were allegedly stolen from her iPhone by a hacker earlier this year.The photographs may or may not be of Scarlett Johansson, but I would suggest that every hot-blooded male exercises some restraint as it's extremely possible that cybercriminals might exploit the interest to post dangerous links on the web designed to infect computers or steal information. To gain access to these email accounts, Chaney would search through details of celebrity lives within magazines as well as social media accounts like Twitter and figure ...
Expert Insights Articles Videos
Cybersecurity Resources