#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Economic offences, cyber crime set to rise !!

Economic offences, cyber crime set to rise !!

Jan 19, 2011
Due to an increase in computer usage in private as well as the government sector, the police recorded a sharp rise in cyber crime last year. A desktop computer is a staple in most households, and use of laptops, net books and smart phones are a rage among everyone — from kids aged six to senior citizens. No wonder then that from just six cases of cyber crime registered in 2006, the number shot up to 76 in 2010. According to Mumbai Police, the nature of cases has also changed in this period. Earlier, most cases were of credit card fraud, but now cyber criminals have graduated to hacking and tampering source code. It is followed by defamation and creating fake profiles due to rivalry or an intent to cause damage. In 2009, cases of phishing attacks by crooks operating from African nations were high, but declined the next year as internet users became smarter. However, cases of uploading obscene pictures and videos rose. Involvement of minors and schoolchildren in cyber crime has been on t...
OECD said Cyber attacks could create 'perfect strom' !!

OECD said Cyber attacks could create 'perfect strom' !!

Jan 19, 2011
Attacks on computer systems now have the potential to cause global catastrophe, but only in combination with another disaster, the Organisation for Economic Cooperation and Development (OECD) said in a report on Monday. The study, part of a wider OECD project examining possible "Future Global Shocks" such as a failure of the world's financial system or a large-scale pandemic, said there were very few single "cyber events" that could cause a global shock. Examples were a successful attack on one of the technical protocols on which the Internet depends, or a large solar flare that wiped out key communications components such as satellites. But it said a combination of events such as coordinated cyber attacks, or a cyber incident occurring during another form of disaster, should be a serious concern for policy makers. "In that eventuality, 'perfect storm' conditions could exist," said the report, written by Professor Peter Sommer of the London Sch...
FBI to press criminal charges over AT&T iPad user data hack !

FBI to press criminal charges over AT&T iPad user data hack !

Jan 18, 2011
Remember last summer when iPad users on the AT&T network in the US were subject to a hack that allegedly saw around 120,000 customers personal details compromised? The FBI certainly remembers and today it is set to reveal details criminal charges relating to the case, according to Reuters. As we reported at the time, hackers seemingly obtained access to the database of 3G iPad owners and their email addresses. The data was obtained by executing a brute force attack on the AT&T website. AT&T offered a convenient way of letting users log into their 3G data plan accounts, auto-populating users email address on the dashboard by referencing the unique identifier (ICC-ID) of the users iPad. AT&T allowed log into their 3G data plan accounts, auto-populating their email addresses on the dashboard by referencing the unique identifier (ICC-ID) of their iPad. It appeared at the time that the hackers produced a script that auto-generated thousands of unique ICC-IDs, harvesting...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
11 Websites hacked by team Jmc H4x0rs !

11 Websites hacked by team Jmc H4x0rs !

Jan 18, 2011
11 Websites hacked by team Jmc H4x0rs ! Hacked Sites : https://tronix.se/ oscommerce2st/catalog/images/ jmcc.html https://www.colecionismo.com. br/loja/images/jmcc.html https://danawa.jp/images/jmcc. html https://www.solarinformatica. com.ar/catalog/images/jmcc. html https://www.boutiquespk.ca/ images/jmcc.html https://www.matech.pl/sklep/ images/jmcc.html https://www.steinkartei.de/ images/jmcc.html https://toy.lt/images/jmcc.html https://www.hiphopdt.de/shop2/ images/jmcc.html https://www.eshoping.lt/ hobbystore/images/jmcc.html https://shop.aplusmoto.ch/ catalog/images/jmcc.html News Source : Jmc H4x0rs | Via Email 
Hacking kits making Cyber Crime Easy !

Hacking kits making Cyber Crime Easy !

Jan 18, 2011
The incidence of cybercrime is set to increase with the proliferation of pre-made hacking software able to be used by less sophisticated criminals, research suggests. IT security software maker Symantec said attack toolkits are becoming more accessible and easier to use, allowing criminals with little technical expertise to turn to cybercrime. The kits can facilitate widespread attacks on computer networks, enabling the launch of pre-written threats, but with certain customised characteristics. Advertisement: Story continues below "In the past, hackers had to create their own threats from scratch," Symantec Australia and New Zealand managing director Craig Scroggie said. This limited the number of hackers, but toolkits are now enabling more people to be involved in cybercrime. A cybercriminal ring was busted late last year over the theft of over $70 million from online banking and trading accounts, allegedly using a kit known as Zeus, Symantec said. "The simplicity, acc...
Phone Creeper v0.98 latest version download !

Phone Creeper v0.98 latest version download !

Jan 18, 2011
" Phone Creeper is a phone espionage suite It can be silently installed by just inserting an sd card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controled by sms text messages. All commands will be silently received and deleted immediately and results will be issued back to sender.  Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default, this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device . " This is the change log: GETPOS command for GPS location now just grab and sends on demand to minimize battery & CPU usage Block list will now also block SMS messages from users in list also, not just calls. Emergency contact and SIM detection features fixed up. GPS google map...
Maltego v3.0.3 - Latest version Download !

Maltego v3.0.3 - Latest version Download !

Jan 18, 2011
"Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego's unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure. Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format" This release offers a fantastic amount of stability and most importantly speed to Maltego. This release also has an updated user guide! Download Maltego v3.0.3  here
Best 5 Cookie Managers tools download !

Best 5 Cookie Managers tools download !

Jan 18, 2011
Free the Top 5 Cookie Managers are , We hope iif you have any other free better known Cookie Managers help us contribute to the list. 1) Cookienator 2.5.32 Cookienator is a tool that will help you remain anonymous from search engines such as Google and other notorious web-usage trackers such as Doubleclick or Omniture. Many websites install cookies in your browser, and these little bits of tracking data will be used to identify you for as long as you keep using your computer. In the past few years I have been alternating between religiously clearing my cookies from time to time, or neglecting to do so with hope that these corporations will live up to their vague promises of doing no evil. Then I decided that it'd be more productive to automate the whole thing, so I spent a good chunk of a weekend creating the first version of Cookienator, a simple program that will leave most of your cookies alone but will remove the ones that put your privacy at risk. It lets users delete evi...
Expert Insights Articles Videos
Cybersecurity Resources