#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Yet Another Google Chrome Sandbox Critical Exploit by Turkish security experts

Yet Another Google Chrome Sandbox Critical Exploit by Turkish security experts

Mar 18, 2012
Yet Another Google Chrome Sandbox Critical Exploit by Turkish security experts Turkish security experts from Arf Iskenderun Technologies, finds the new vulnerability open in Google Chrome 17.0.963.78 , same risk working on new update 17.0.963.79 and bypass Chrome SandBox. Last week,  Vupen Security reports that it has officially "pwned" Google Chrome's sandbox. Vupen hacked Chrome 17.0.963.66 update. But, Turkish security experts claim that they hacked Chrome Sandbox after Vupen and This vulnerability is critical for Chrome.  A sandbox is security mechanism used to run an application in a restricted environment. If an attacker is able to exploit the browser in a way that lets him run arbitrary code on the machine, the sandbox would help prevent this code from causing damage to the system. The sandbox would also help prevent this exploit from modifying and even reading your files or any information on the system. Maiden says th...
Cyber Criminals Selling Millions of U.S military email addresses

Cyber Criminals Selling Millions of U.S military email addresses

Mar 18, 2012
Cyber Criminals Selling Millions of U.S military email addresses Web based underground market service currently selling Millions of harvested U.S government and U.S military harvested emails addresses to potential spammers, and find out just how easy it is to purchase that kind of data within the cyber crime ecosystem. Cyber criminals are getting more sophisticated in their scams and phishing schemes, which are designed to steal personal data and financial information. Spammers and virus creators are motivated by money and backed by organized crime on a global scale. They are also launching massive attacks on anti-spam organizations in an attempt to bring them down. In respect to targeted malware attacks, the service is currently offering 2.462.935 U.S government email addresses, and another 2.178.000 U.S military email addresses. A Screenshot of the inventory of harvested emails currently offered for sale: Spammers buy lists from brokers that continuously harvest email ...
Roman Andreev wins Facebook Hacker Cup 2012

Roman Andreev wins Facebook Hacker Cup 2012

Mar 18, 2012
Roman Andreev wins Facebook Hacker Cup 2012 25 of the world's best hackers gathered for Facebook's 2nd annual Hacker Cup event being held at its offices in Menlo Park. Roman Andreev from Russia completed one problem correctly in 1 hr 4 min and won Facebook's Hacker Cup to get his name placed on an awesome and really heavy cement trophy along with a check for $5000. The registration for the event opened in January and started off with three online rounds of problem solving. Out of 6,000 (8,000 submissions total) qualifying submissions, the group has been shrunken down to just 25 and flown to Facebook for the finals.The top coders, all male from around the world, are a mix of students, independent coders, and professionals. Facebook paid their way to California, including a stipend for obtaining a Visa, since only one of the participants is from the United States. The rest of the finalists are from Russia, Germany, Ukraine, Poland, China, South Korea, Taiwan, and Japan. The par...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Continuously Monitor Your Cyber Insurance Requirements

websitePreludeSecurity Control Validation
Quickly spot the critical control gaps that mean the difference between a successful claim or losing millions.
iPad 3 jailbroken on Launch Day by 3 ways

iPad 3 jailbroken on Launch Day by 3 ways

Mar 18, 2012
iPad 3 jailbroken on Launch Day by 3 ways The new Apple iPad (third iPad, iPad 3) has already been jailbroken in at least three different ways. On the same day that Apple started shipping the new iPad out to consumers, there were reports that at least one hacker had already jailbroken the latest tablet. The first to claim was @Musclenerd, a member of the iPhone Dev Team,  tweeted a couple of images showing that he had already jailbroken the device. This must be a great relief for Apple fans who want to have their Apple devices, but don't want Cupertino based tech giant to keep it restricted as it wants. Within the 24 hours of the iOS 5.1 update, teammate @pod2g revealed an untethered jailbreak for the iPad 2 and iPhone 4S. With the new iPad running iOS 5.1 and an A5X processor. His hack was followed by the announcement of a successful untethered jailbreak by teammate, @i0n1c, who released a video as evidence to his accomplishment: Finally, a Tweet by @chpwn ...
Australia's first national cyber security competition Announced

Australia's first national cyber security competition Announced

Mar 18, 2012
Australia's first national cyber security competition Announced Australia's first national cyber security competition, the 2012 Cyber Defence University Challenge, was launched today by broadband minister Senator Stephen Conroy. If you are an undergraduate with top cyber problem-solving skills then Australia's first national Cyber Defence University Challenge is probably for you. The Challenge runs for 24 hours on 3 to 4 April, and will test the cyber problem-solving skills of teams of Australian undergraduates in a virtual network environment.The ultimate prize, sponsored by Telstra, is travel and entry to the Black Hat 2012 Conference in Las Vegas in July 2012. Senator Conroy sxays the competition is a partnership between the federal government, universities and Telstra. " The Government is committed to working with industry to develop a safe and secure digital economy for Australians ," Senator Conroy said in a statement. " We are also committed to i...
Microsoft Hacking Code leaked from security info-sharing program

Microsoft Hacking Code leaked from security info-sharing program

Mar 18, 2012
Microsoft Hacking Code leaked from security info-sharing program Microsoft on Friday confirmed that sample attack code created by the company had likely leaked to hackers from a program it runs with antivirus vendors. Code that was submitted to Microsoft last year to demonstrate a serious exploit in Windows has somehow made it into the wild, either through Redmond itself or one of its security partners. The exploit targets a vulnerability in Windows' remote desktop protocol, giving an attacker full control over a system and the ability to easily spread to other machines with remote desktop enabled. Security researchers raised alarms when a working exploit for the flaw was spotted in China shortly after the release, leading many to believe that malware writers were able to breach the Microsoft Active Protections Program security platform. " The details of the proof-of-concept code appear to match the vulnerability information shared with Microsoft Active Protections Progr...
DarkComet-RAT v5.1 Released - Remote Administration Tool

DarkComet-RAT v5.1 Released - Remote Administration Tool

Mar 18, 2012
DarkComet-RAT v5.1 Released - Remote Administration Tool This new version of the famous darkcomet RAT , a remote management tool created by DarkCoderSc . DarkComet is also considered as the most stable RAT around and it is even regarded more stable than some professional ones. Change Log: - [GUI ] Control center GUI change a little bit - [FUNC] New functions added in control center >> Network category, called WIFI Access points, now you can see near wifi networks and hardware wifi card(s) - [GUI ] Now in layout settings you can change the main windows GUI if you don't like the default one. - [FIX ] Fix the ftp upload keylogger problem - [SYS ] Edit server settings system was revised and optimized - [FIX ] DNS/IP backups issue fixed - [SYS ] DNS/IP backups algorythm revised and more reliable - [SYS ] Big problem fixed in client / server system - [SYS ] Loader environement is more lite, unused function / variables been track and clean also few important functions been ...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>