#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Corruption and Persistent Vulnerability in Skype 5.8 and 5.5 [Video POC]

Corruption and Persistent Vulnerability in Skype 5.8 and 5.5 [Video POC]

Mar 29, 2012
Corruption & Persistent Vulnerability in Skype 5.8 and 5.5 Ucha Gobejishvili ( longrifle0x ) Benjamin Kunz Mejri (Rem0ve)&Alexander Fuchs (f0x23) , security Experts from The Vulnerability-Lab Team discovered a remote pointer corruption with persistent weakness on Skypes v5.8.0.156 Windows 7 & MacOS v5.5.2340. The security risk of the remote denial of service vulnerability via pointer corruption is estimated as high(-). Skype is a software application that allows users to make voice and video calls and chats over the Internet. Calls to other users within theSkype service are free, while calls to both traditional landline telephones and mobile phones can be made for a fee using a debit-baseduser account system. According to Expert, Vulnerability was reported to Vendor on 2012-02-24,  and Vendor Fix/Patch by Check on 2012-03-20. Affected versions are Skype - Windows, MacOs & Linux v5.8.0.156, 5.5.0.2340, 2.2 Beta. The exploitation met...
Office based Trojan threat for Mac OS X by Chinese hackers

Office based Trojan threat for Mac OS X by Chinese hackers

Mar 29, 2012
Office based Trojan threat for Mac OS X by Chinese hackers Security company ESET watches the newly found Trojan for OS X establish connections and receive commands to steal information. Earlier this month, researchers from AlienVault and Intego reported a new malware attack targeting Tibetan NGOs (Non-Governmental Organizations).  The attack consisted of luring the victim into visiting a malicious website, which then would drop a malicious payload on the target's computer using Java vulnerability CVE-2011-3544 and execute it.  During installation on a Windows system, the payload deployed was a variant of Gh0st RAT (Remote Access Trojan). On the Mac though, a new payload, dubbed OSX/Lamadai.A, was used. ESET observed that once the Trojan installs it will establish a connection to a hard-coded remote C&C server located in China, and will wait in "busy" loop where it attempts to maintain its connection with the server. The server can then be used to issue co...
Kelihos Botnet with 110,000 PCs take down finally

Kelihos Botnet with 110,000 PCs take down finally

Mar 29, 2012
Kelihos Botnet with 110,000 PCs take down finally Botnets are particularly insidious, using thousands of virus-infected computers which their owners are unaware are being used for sending out spam, launching denial-of-service attacks and stealing data.But taking down a botnet poses challenges. The main problem is that legitimate security companies can't use the same type of weapons as criminals. A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the second version of the Kelihos botnet, which is significantly bigger than the one shut down by Microsoft and its partners. Kelihos is used to send spam, carry out DDoS attacks, and steal online currency such as bitcoin wallets. It operates as a so-called "peer-to-peer" bot network, which are more difficult to take down than those with a centralized command and control servers (C&C), according to Tillmann Werner, a senior ...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Reduce Your Missing Controls by 89%

websitePreludeExposure Management / Endpoint security
Monitor and alert on misconfigurations and missing controls like EDR and MFA during your free trial of Prelude.
Dominican Republic Police arrested 6 Anonymous hackers

Dominican Republic Police arrested 6 Anonymous hackers

Mar 27, 2012
Dominican Republic Police arrested 6 Anonymous hackers Dominican Republic Police has arrested six hackers , Milton Corniell David Jimenez (Zerohack), Juan Rafael Leonardo Acosta (Nmap), Cristian de la Rosa Jose de los Santos (Mot), Robert Reynoso Delgado (Frank-Ostia) linked to Anonymous and accused by the authorities of attacking websites of state and private companies. Public Prosecutor German Vasquez alleges the six hacked into government websites, including ones for the president and the education ministry. He says the suspects range in age between 17 and 23. The members of combat cyber crime unit made the arrest in an joint operating in the country early Sunday in the capital Santiago. Defense lawyer Carlos Guerrero denies the accusations and says the government has no evidence. The defendants are accused of cyber terrorism, which the prosecution defined as a new form of threats and vulnerabilities in the Internet. denunciations of the "hacks" to institutions DG Int...
Japan orders Google to remove auto-complete function over privacy complaint

Japan orders Google to remove auto-complete function over privacy complaint

Mar 27, 2012
Japan orders Google to remove auto-complete function over privacy complaint Google has been ordered to disable part of its autocomplete function in Japan after complaints it violates privacy. According to a report by The Japan Times, the court was acting on a petition accusing Google's autocomplete feature of being defamatory. The petition was filed by a Japanese man (name not disclosed) who alleged that some of the autocomplete suggestions accompanying his name were not only defamatory but also breached his privacy. The unnamed petitioner, in fact, claimed that these defamatory search suggestions even cost him his job. The man came to this conclusion after discovering that when people type his name into Google's search engine, words suggesting criminal acts, which he is unfamiliar with, automatically appear. If a computer-suggested term is selected, more than 10,000 items defaming or disparaging him show up in a list, Tomita said. Google has so far not carried out the court...
Customer Credit Reports for Resale in Black market

Customer Credit Reports for Resale in Black market

Mar 27, 2012
Customer Credit Reports for Resale in Black market Internet security concerns grew the most, Approximately half of respondents said they were seriously concerned about viruses, spam, and the safety of online shopping. 70% of respondents said they were seriously concerned about identity theft, and 68% said they were seriously concerned about credit or debit card fraud. MSNBC today reported that, Hackers breach into credit rating agencies and stealing customer credit reports for resale on the black market. They claim that AnnualCreditReport.com, Equifax.com, or CreditReport.com are being hacked and consumer data stolen from them. " I'm selling super prime credit reports and scores which include all 3 bureaus and other information ," brags one advertisement on one site. Hackers' claim that the credit reporting firms are easy to compromise. The hacker explained that the trick is to open several credit report sites and keep trying random answers until one set works. A w...
17-year-old Hacker arrested for hacking into KPN mobile telecommunications

17-year-old Hacker arrested for hacking into KPN mobile telecommunications

Mar 27, 2012
17-year-old Hacker arrested for hacking into KPN mobile telecommunications A 17-year-old boy has been arrested for hacking into mobile telecommunications company KPN in the Netherlands. He has also been accused of other breaches in Japan, Korea, and Norway. The teenager was arrested last Tuesday in the Dutch town of Barendrecht, where police seized an encrypted computer, two laptops and other storage media including external hard drives, DVDs and USB sticks. The arrested teenager called himself "xS", "Yoshioka" and "Yui" online, is also suspected of breaching security of Tokohu University in Japan, as well as hacking computers at the Korea Advanced Institute of Science and Technology (KAIST) and at Trondheim University in Norway. Last but not least, he reportedly ran a website used for selling stolen credit card data. KPN also noted the arrest is unrelated to a January hack which resulted in the company taking 2 million e-mail accounts offline as a pre...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>