#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

Jan 18, 2011
aidSQL is a PHP application provided for detecting security holes in your websites. It is a modular application, meaning that you can develop your very own plugins for SQL injection detection & exploitation. Sample usage of aidsql: ./aidSQL --url=www.sample123.com We find it similar to nikto, whatweb and others. One good feature is that we can get a reverse basic shell once exploited. It also has a simple shell script which will run aidSQL and do some checking for PHP. You can also Google through this application and look up for sites. It also includes a primitive crawler. Download aidsql (aidsql-devel-01102011.tgz) here News Source : Google
Rapper Lil Wayne's Twitter account hacked !!

Rapper Lil Wayne's Twitter account hacked !!

Jan 18, 2011
Rapper Lil Wayne has become the latest victim of web hackers when his Twitter account was compromised by an internet prankster. The 28-year-old hip hop star has suspended his Twitter account after the hacker sent a number of objectionable messages to his fans and followers, reported Contactmusic. The 'Lollipop' hitmaker's page was illegally accessed on January 16 and rude messages were sent to his celebrity pals which included 50 Cent, Soulja Boy and The Game. The hacker also posted explicit jibes about the rapper's recent spell in prison on weapons possession charges. One of the post sent to Soulja Boy reads, "I sent a donations (sic) to your Paypal, check it, I heard you got 13,000 (record) sales lil homie, I feel bad for you!" Wayne's page was also hacked last year where the prankster posted fake news of the rapper performing with Nicki Minaj. His account has now been taken offline. News Source : Times of India
Man Tunnels Into GameStop & Steals Games !

Man Tunnels Into GameStop & Steals Games !

Jan 18, 2011
Here In the title i have mentioned that "Man Tunnels" It means that he literally tunneled into the system. Game Piracy is the business all over the world.But there are some guys who don't need to do piracy.They are digging into the system of the local game shop sites and making stocks as much as then can in no time. This man has stolen games like Greeneville & Tennesse , After that he got arrested in last week for being tunneling into the local game shop.Steven Archer, 33, making off with almost $300 in cash and around $5,400 in games. But truth always wins.He could not enjoy his his gotten gains ( The games which are stolen By this man )and he got arrested last week.The man was arrested by Detective Pat Hankins.He was being charged with felony burglary. So the conclusion is that the people who don't want to spent money to buy games,they should wait to come the money in their hand and then to buy original game cd/dvd rather to digging into the system and g...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
Hackers will not be deterred by UK cyber defences !

Hackers will not be deterred by UK cyber defences !

Jan 18, 2011
Military "cyber weaponry" will become commonplace this century, but it will be unlikely to deter attacks by "hacktivists" and criminal gangs, and could easily be used for state-sponsored cyber attacks instead, the Organisation for Economic Co-operation and Development warns. The British authors of the study, which is released today, also caution that "lurid language" and lobbying by technology firms distort the government's plans to protect Britain against cyber attacks. Professor Peter Sommer of the LSE and Dr Ian Brown of Oxford University's internet institute were commissioned by the OECD for one of a series of investigations into potential "future global shocks". Their report comes at a time of heightened awareness of online attacks following hacking protests against companies caught up in the WikiLeaks controversy. In response to other hacking attacks from groups inside China and Russia, military preparations have begun to ga...
Four years on, phone-hacking scandal is still growing !

Four years on, phone-hacking scandal is still growing !

Jan 18, 2011
Four years after the phone-hacking scandal at the News of the World saw the newspaper's former royal correspondent, Clive Goodman, jailed, the story refuses to die. Each week another celebrity launches a legal action against the paper, generating a fresh batch of damaging allegations that Rupert Murdoch's media empire could do without. The Observer has established that at least six people have issued proceedings against the paper, with potentially scores more in the pipeline. The problems for the tabloid, however, are not confined to these cases. Eleven people are taking separate legal action against Glenn Mulcaire, the private investigator at the heart of the scandal, who is appealing against a decision to make him divulge which journalists on the paper paid him to hack phones. Until this case is resolved – the court of appeal is expected to hand down a judgment in May – many outstanding issues cannot be addressed. "It's vital that the court of appeal acts to br...
Car thieves can easily hack remote keyless systems !

Car thieves can easily hack remote keyless systems !

Jan 18, 2011
Those remote key fobs nearly all automakers offer -- turns out they're fairly easy to hack so the bad guys can unlock your car and high-tail it before you even finish your shopping. Your only advantage: If your car has a remote that still requires a key, the bad guys can't start it easily, even though they can open the doors and trunk and get inside. Cars that have keyless entry and the push-button ignition switches becoming more common are in the most jeopardy. The thieves can, in fact, start those vehicles because the same purloined signal that opens the doors also tells the push-button system it's OK to start the car when somebody pushes the button. The setup for hacking is easy, but not simple. It requires a couple of special antenna and a certain proximity to the victim, the Swiss researchers found. The research company, ETH Zürich, hacked into eight automakers' remote-entry systems. No coding system could stop it, the researchers said.
Kinect hackers take control of the action !

Kinect hackers take control of the action !

Jan 18, 2011
Christopher Baker spent Boxing Day as a VJ – video jockey – for a warehouse party in Liverpool. Among the items being used was a Microsoft Kinect controller, normally used to play Xbox 360 games such as Kinectimals or Kinect Sports. But Baker wasn't playing games: the system was rigged up to a computer running software to interpret the movement data being gathered by the system. The software Baker had written monitored how the clubbers were moving and used that to affect the sound, creating a feedback loop between dancers and sound. "It was popular with the clubbers because they could interact directly with the sound and were immersed in the experience," he says. Baker, who works at Apposing, a mobile app development company based in Liverpool, is one among hundreds of people who have embraced the Kinect not for its potential in gaming (though that is substantial), but because, unusually for an Xbox accessory, its outputs can be put to different – and in some cases revo...
UK premier supplier of iPhone and iPod touch accessories website Got Hacked by KillerMind HaXor !

UK premier supplier of iPhone and iPod touch accessories website Got Hacked by KillerMind HaXor !

Jan 17, 2011
UK premier supplier of iPhone and iPod touch accessories website Got Hacked by KillerMind HaXor !  Link :  https://www.iphonebits.co.uk/ Mirrors :  https://www.zone-h.org/mirror/id/12911520 https://mirror-az.com/mirror/?id=9382 News Source :  KillerMind HaXor
Expert Insights Articles Videos
Cybersecurity Resources