#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Pirated Content Sites Hacked Attract Billions Of Years !

Pirated Content Sites Hacked Attract Billions Of Years !

Jan 20, 2011
Web sites hawking pirated software and other digital goods will attract about 53 million visits per year. This is according to a report (PDF) released yesterday by MarkMonitor, a company that protects online brands to its corporate clients. The hacking scene of the majority of the 53 billion hits, while those who sell counterfeit goods such as counterfeit prescription drugs and luxury items accounted for a significantly smaller amount of traffic: about 92 million visitors per year. MarkMonitor has identified 43 sites that participated in digital piracy. Among them, three sites -. Rapidshare, Megaupload.com and Megavideo.com-represented about 21 billion hits a year. Of course, these sites say they discourage the downloading and sharing copyrighted material through their conditions of service. In response to the findings of MarkMonitor, issued the following statement RapidShare.com he e-mailed to CNET: "We read the study unpleasant brand of US-protection company MarkMonito...
Israel Tested For The Virus Linked To Iran's Nuclear Boredom !

Israel Tested For The Virus Linked To Iran's Nuclear Boredom !

Jan 20, 2011
The intelligence services of Israel and the United States collaborated in the development of a computer virus that have sabotaged nuclear centrifuges to Iran and a slowdown in its ability to develop a nuclear weapon, the New York Times reported Sunday. The newspaper reported that Israel has tested the effectiveness of worm Stuxnet its nuclear complex at Dimona in the Negev desert, before releasing him. The report quoted intelligence and military experts and officials say that the effort to create the worm Stuxnet was a joint US-Israeli project, which also had the cooperation of Britain and Germany. "You can control the worms, you need to know the machines," American expert told the Times. "The reason for the worm to be effective, that the Israelis have tried," he added. These days, the Times said the outgoing head of the Israeli intelligence agency Mossad, Meir Dagan, and Secretary of State, Hillary Rodham Clinton announced separately that they believed Iran...
Two men charged for Hacking into AT&T Website !

Two men charged for Hacking into AT&T Website !

Jan 20, 2011
Two men were arrested on Tuesday and are facing charges of fraud and conspiracy to access a computer without authorization, following an investigation that started with last year's much publicized harvesting of e-mails and AT&T authentication IDs of 114,000 early-adopters of Apple's iPad. According to the NYT, Daniel Spitler of San Francisco and Andrew Auernheimer of Fayetteville - members of a group calling itself Goatse Security that has a history of warning about security vulnerabilities - are the only ones who will be prosecuted for the breach, even though the group counts some ten members altogether. The likely reason for this decision on the part of the district attorney is that the prosecution possesses a transcript of chat logs between Spitler and Auernheimer, in which they discuss the way they accessed the information and muse on how to use it. And even though there is no proof or indication that they intended to sell the information, they shared the script t...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
Malware and phishing increasing via social networks !

Malware and phishing increasing via social networks !

Jan 20, 2011
By mid-2010, Facebook recorded half a billion active users, making it not only the largest social networking site, but also one of the most popular destinations on the web. Unsurprisingly, this massive and committed user base is heavily targeted by scammers and cybercriminals, with the number and diversity of attacks growing steadily throughout 2010 – malware, phishing and spam on social networks have all continued to rise in the past year, with a Sophos survey finding that: 40% of social networking users quizzed have been sent malware such as worms via social networking sites, a 90% increase since the summer of 2009 Two thirds (67%) say they have been spammed via social networking sites, more than double the proportion less than two years ago 43% have been on the receiving end of phishing attacks, more than double the figure since 2009. "Rogue applications, clickjacking, survey scams – all unheard of just a couple of years ago, are now popping up on a daily basis on social netwo...
The unofficial guide to Facebook privacy !

The unofficial guide to Facebook privacy !

Jan 20, 2011
To fully understand the privacy of Facebook and how it's likely to evolve, you need to understand one thing - Facebook executives want everyone to be public. As the service evolves, executives tend to favor our open access to information, meaning information you think is private will slowly become public, but that doesn't mean you can be private if you want to. Facebook gives its users the option to lock things down, but users need to be aware of their controls, how to use them and how to prepare for future Facebook privacy changes. Facebook has not and will not make information obvious, and that's where   this free guide  comes in. News Source : Google
Report : A global shift in cybercrime !!

Report : A global shift in cybercrime !!

Jan 20, 2011
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that malicious tools became more customized, automated and persistent in 2010. This trend combined with the popularity of mobile devices and social media is providing the perfect recipe for cybercriminals looking to compromise business, customer and user private and sensitive information. Key findings: Food and beverage regained its title as the most breached industry-representing 57% of the investigations. Third-party vendors continue to put companies at risk-88% of breaches resulting from insecure software code or lax security practices in the management of third-party technology. Cybercriminals got fresh in 2010-because in-transit credit card data is usually more recently created (more fresh) than stored data, 66% of investigations found the theft of data in transit. A single organized crime syndicate may be respon...
University of Sydney failed to secure vulnerable web data !!

University of Sydney failed to secure vulnerable web data !!

Jan 20, 2011
The detailed records of thousands of University of Sydney students past and present are being stored online where they can be easily downloaded and read via an internet connection. It is understood the university was told about this security threat in February 2007, but did not move to secure the information. This website was made aware of the breach after it revealed yesterday the university's website was  sabotaged and altered at the weekend by a hacker . Advertisement: Story continues below Details openly available on the university site include a student's full name, residential address, email address, which courses he/she studied and how much the course cost. The vice-chancellor of the University of Sydney, Michael Spence, declined to comment on the suggestion that the university had been warned about lax security four years ago, but said he was ''appalled to be notified that some records could be accessed in this manner''. He called the breach an '...
Big John's Trees's Website defaced By Team Jmc H4x0rs !!

Big John's Trees's Website defaced By Team Jmc H4x0rs !!

Jan 20, 2011
Big John's Trees's Website defaced By Team Jmc H4x0rs !! Link :  https://bigjohnstrees.com/ News Source : Team Jmc H4x0rs | Via Email
Expert Insights Articles Videos
Cybersecurity Resources