-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Spam Text message offers gift card to Target

Spam Text message offers gift card to Target

Dec 01, 2012
A popular scam that always seems to pop up around the holiday shopping season has once again resurfaced.Have you gotten a text message promising a free gift card? All you have to do is click on a link? However, it was a scam. Case :  A text message has been popping up on Central New Yorkers’ phones saying they've won a Target gift card worth $1,000. It’s a scam – do not click on it and quickly delete it. Links within the message connect you to bogus websites that are designed to collect sensitive, private information from people who think they've really won a prize. The text messages most frequently come from Target, Best Buy or Walmart. How did someone get your number?   How many times have we filled out things for either restaurant surveys or fill out this survey and get a coupon? If that information isn't being properly secured, it's very easy to get that data if its saved in clear text or unencrypted data. People have their cell phone ...
Syria suffers nationwide communications outage

Syria suffers nationwide communications outage

Nov 30, 2012
The Syrian situation is getting worse day by day, the regime is attacking dissident mercilessly meanwhile the world wide community is standing by and watch helplessly stopped by prohibition of military intervention imposed by Russia and China, historical allies of Damascus. Syria regime is fierce against the rebels in the streets as in cyber space, we have already discussed of the persecution of opposition made using spyware to catch the rebels. Syrian regime is also convinced that leaks from the country on the massacres by the regime might aggravate the position of the government and then several times in the last year the government has stopped internet access in the country thanks to a kill switch. In this hours it has been registered an unprecedented national internet blackout while the battle with rebels raging in the country and in the capital. This time the blackout as totally isolated the country blocking also land lines and cellphone networks. On the incident is started a m...
Samsung printer having secret admin account Backdoor

Samsung printer having secret admin account Backdoor

Nov 28, 2012
US CERT warn about Some Samsung printers, including models the Korean company made for Dell, have a backdoor administrator account coded into their firmware. This hard coded admin account in firmware could enable attackers to change their configuration, read their network information or stored credentials and access sensitive information passed to them by users. Screenshot Even if SNMP is disabled, this " backdoor administrator account " is still active and could be used by an attacker to access the printer. SNMP is an Internet protocol commonly used to monitor and read statistics from network-attached devices. US-CERT did not provide a list with the exact printer models affected by the issue, but said that, according to Samsung, models released after Oct. 31, 2012, are not vulnerable. As for the Dell model, Samsung builds Dell printers such as the B1160w modeled after Samsung's ML-2165W compact all-in-one printer. It's unclear what other Dell b...
cyber security

Secure Coding Best Practices [Cheat Sheet]

websiteWizSecure Coding / DevSecOps
Secure coding starts long before production. Reduce risk early with practical secure coding and design best practices.
cyber security

Inside the 2026 Cyber Workforce: Skills, Shortages, and Shifts in the Age of AI

websiteSANS InstituteAI Security / Cybersecurity
Insights to help leaders make informed decisions and show practitioners where careers are heading.
Hardware based malware steals contacts from all mobile platforms using only the Audio Jack!

Hardware based malware steals contacts from all mobile platforms using only the Audio Jack!

Nov 28, 2012
Indian Security Research Atul Alex presented his surprise paper at the International Malware Conference, MalCon on what can be termed as the onset of next generation of hardware based malware that can target mobile devices irrespective of Platforms. Typically, one of the largest challenges for malware coders are to target multiple platforms. A malware for Android will not work in Windows phone, Symbian or Apple iOS, which come in way of malware coders. Also, devices such as iPhone are extremely secure and there is little that can be extracted from a locked / secure iPhone, unless they are jailbroken. Atul Alex's research abuses voice dialing feature which is enabled by default on all mobile platforms - and combines a bugged headset with a micro controller and code to steal private data. The bugged headset can also dial a pre-defined number by detecting if the device is in use or not and turn the phone into a spy device. Further, it can steal contacts from all devic...
Algerian Hacker hijack Romanian Google and Yahoo Domain

Algerian Hacker hijack Romanian Google and Yahoo Domain

Nov 28, 2012
Algerian Hacker today hijack DNS Yahoo, Microsoft or Google and Paypal redirect users to a deface page. Credit being taken by Hacker going by name MCA-CRB , a serial website defacer. MCA-CRB is a prolific online graffiti artist who has defaced at least 5,000 sites, according to records kept by Zone-H. After Hijacking both domains resolve to an IP address located in the Netherlands,” at 95.128.3.172 (server1.joomlapartner.nl). “ When we heard about this incident, we were pretty skeptical about the attack. A site such as Google’s can be theoretically hacked, but it is very unlikely. Then we noticed that both domains were directed to an IP address in the Netherlands […], so it seemed more like a DNS poisoning attack ,” said Stefan Tanase from Kaspersky Lab Romania. " All we know is that Google's public DNS servers (8.8.8.8 and 8.8.4.4) were resolving requests for google.ro and other major .RO websites to the IP address hosting the defacement page ," Tanase said. Google ...
XSS vulnerability in 4shared and NATO Multimedia Library Exposed

XSS vulnerability in 4shared and NATO Multimedia Library Exposed

Nov 28, 2012
Inj3ct0r Team found cross site scripting vulnerability in  4shared , a file sharing site. Vulnerability link is exposed in a note  available at their website.  In general, cross-site scripting refers to that hacking technique that leverages vulnerabilities in the code of a web application to allow an attacker to send malicious content from an end-user and collect some type of data from the victim. Also same hackers claiming to get access over a private server of NATO Library and expose the links online. Website titled " NATO Multimedia Library Online Catalog ". Inj3ct0r member told The Hacker News , " We found another secret NATO server. We received a root on the server and gave the world the hidden database to NATO personnel. Now everyone can look for a secret document ." These three servers are available online without authorization, but its not confirm that servers got hacked or not.
Lulzsec hacker Jeffrey could face Life Imprisonment

Lulzsec hacker Jeffrey could face Life Imprisonment

Nov 28, 2012
Lulzsec Hacker , Jeffrey Hammond faces a potential prison sentence of more than 30 years if found guilty of all charges filed against him. U.S. District Court chief judge Loretta Preska, who presided over a bail hearing for Hammond want last week. Hammond was also charged with using some of the stolen credit card data to help make $700,000 in unauthorized charges, and accused of participating in a hack of the Arizona Department of Public Safety website. " In early May 2012, a federal grand jury handed down a superseding indictment in the case against alleged LulzSec and Anonymous leaders, accusing Hammond of masterminding the LulzSec and Anonymous attacks against the website of Stratfor (a.k.a. Strategic Forecasting), beginning in December 2011. " Informationweek said . " At last week's hearing in a Southern District of New York federal courtroom, Hammond's defense attorney, Elizabeth Fink, suggested that the FBI may have used entrapment to catch her client, ...
Expert Insights Articles Videos
Cybersecurity Resources