#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Brazilian Government website Hacked By KiLLerMiNd (PakCyberHaxors Crew)

Brazilian Government website Hacked By KiLLerMiNd (PakCyberHaxors Crew)

Jan 20, 2011
Brazilian Government website Hacked By KiLLerMiNd (PakCyberHaxors Crew) Website link :  https://www.juquitiba.sp.gov.br/ Zone-H mirror :  https://www.zone-h.org/mirror/id/12931727 News Source : KiLLerMiNd | Via Message
Devansh Kumar Jain Found Xss venerability in 4 Websites !

Devansh Kumar Jain Found Xss venerability in 4 Websites !

Jan 20, 2011
Devansh Kumar Jain Found Xss venerability in 4 Websites !  Devansh Kumar Jain is a 14 years old Hacker From Agra, India . He found some Xss venerable sites,as listed below : 1.)   https://sdb.drshnaps.com/search.php?q= <script>alert(String.fromCharCode(68,69,86))</script> 2.)   https://www.newdimensions.org/search.php?q= <script>alert(String.fromCharCode(68,69,86))</script> 3.)   https://classifieds.successcds.net/search.php?q= <h1><b><i>hi</i></b></h1> 4.)   https://pcstats.shoplinc.com/search.php?q= <script>alert(String.fromCharCode(68,69,86))</script> News Source : Devansh Kumar | Via Message
All backtrack tools & menu install in your Ubuntu !

All backtrack tools & menu install in your Ubuntu !

Jan 19, 2011
All backtrack tools & menu install in your Ubuntu ! Download : Click Here Download :  Click Here
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
Tips for Make Mobile Banking Safe And Secure !

Tips for Make Mobile Banking Safe And Secure !

Jan 19, 2011
As we all know that wireless applications have numbers of vulnerabilities higher then the wired applications and the devices. In India there are not lots of people who do banking through mobile but outside India there are high profile countries in which many people do banking through mobile only.So the assurance of the security is needed for them. Here are some recommandation that the bank and the financial institutions which to be noted and to be implemented in their system. - Implement 2 way and 2 factor authentication which goes with the traditional username and the password.If username and password are compromised, the attacker still needs the second factor to gain access to an account. - Implement high transaction monitoring and also fraud detection system.If hacker passes the 1st factor of authentication or the front door,he is being started tracking by tracking system.The system have to generate logs of the activity of the account and the transaction. -Avoid storing...
In.com database hacked , SQL vulnerabilities Found By Sec Indi !

In.com database hacked , SQL vulnerabilities Found By Sec Indi !

Jan 19, 2011
In.com  database hacked , SQL vulnerabilities Found By Sec Indi ! IN.com has found many SQL vulnerabilities, vulnerabilities found by  Sec Indi (Indian hacker) . We have already  inform the webmasters to patch those  vulnerabilities as soon as possible. Well here blow as proof we are just showing the Table and Columns from database.  News Source :  Sec Indi | Via Email 
Hackers hack into University of Sydney !!

Hackers hack into University of Sydney !!

Jan 19, 2011
A hacker has targeted the University of Sydney in order to show administrators their faulty security practices, but the matter has triggered an investigation. An internal email sent by vice-chancellor Michael Spence says the university has already hired "two of Australia's leading web security organisations". "Each day, the university's IT networks experience numerous attempted security breaches, which are blocked by our security systems," he said. "Unfortunately, last week a malicious hacker managed to bypass these mechanisms and accessed the university's home page and some high level corporate web pages." He also wrote the website was still intact, and that no private information such as financial details had been released. However, it is understood the hacker defaced the website of the university. Spence also wrote in the email the university is aware of the possibility of more attacks occurring. News Source : Google
Tech2spider found SQLi Vulnerability in University of Michigan - Department of Human Genetics Website !

Tech2spider found SQLi Vulnerability in University of Michigan - Department of Human Genetics Website !

Jan 19, 2011
Tech2spider ( Krunal)   found SQLi Vulnerability in University of Michigan - Department of Human Genetics Website ! News Source :  Krunal aka (tech2spider) | Via Email
Julian Assange's hacking offences revealed in Australian court documents !!

Julian Assange's hacking offences revealed in Australian court documents !!

Jan 19, 2011
IN 1991, using just a "simple, basic computer" from his home in suburban Melbourne, a young Julian Assange created a program that allowed him to access about 11,000 computers belonging to the giant Canadian telecommunications company Northern Telecom. New details of the WikiLeaks founder's early computer hacking-related offences have emerged in court documents released toThe Australian under an application to the Victorian County Court. The documents include a transcript of Mr Assange's 1996 pre-sentencing hearing for 24 computer-related offences, including accessing a server of Northern Telecom. While offering an insight into his unstable childhood, the documents also show the controversial website creator already displayed remarkable computer skills in his early adult life. In its submissions to County Court sentencing Judge Leslie Ross in December 1996, the prosecution described Mr Assange, then 25, as a far more sophisticated hacker than two other men char...
Expert Insights Articles Videos
Cybersecurity Resources