#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Beware Of Phishing Scams, Vishing, And Other Smishing !

Beware Of Phishing Scams, Vishing, And Other Smishing !

Jan 22, 2011
Better Business Bureau has published a list of top 10 scam that seems not only to the biggest scam in 2010, but what to watch in 2011. In no particular order, here they are: Door to door scams Each of the new season of the show to attract new scammer port provides an incredible offer: Roofing in the spring, paving contractors in the summer and heating contractors in the fall. These entrepreneurs fraudulent use of high pressure sales tactics to scare people with expensive even worse - a job that is not the way to contact them if you do not - and often useless. Tip: Do not give in to high pressure sales tactics. Take the time to do your due diligence, to obtain the name and location of the company and ensure all the details and verbal promises are included in the contract. If you do not sign the agreement and would like to change my mind, BC law, if it was door to door sales contract after you have 10 days to withdraw from advising the company. Suspicious door-to-sale must infor...
Worm Virus Twitter Scam Push Rogue !

Worm Virus Twitter Scam Push Rogue !

Jan 22, 2011
Thousands of Twitter users are believed to have been struck with malicious links tied to a rogue anti-virus hoax circulating the microblog service. Scam is spreading malicious links goo.gl wrong URL shortening services. According to Kaspersky Lab, malicious links to redirect users to different areas with "m28sx.html page. This is an HTML page directs users to a static domain, the Ukrainian top-level domain. From there, the blog of Senior Research Kaspersky Lab Malware Researcher Scientist Nicolas Brulez, the domain name directs the user's IP address, press the fake antivirus. "Once on this site," Burn blog, "I [a] warning that your machine is running suspicious applications and invite you to explore. ... The user is prompted to remove all threats to your computer and download a fake antivirus application [sic] called "Safety Shield." Del Harvey, Director of Trust and Security on Twitter, tweeted about the day that the company aims to remove the ...
3 Websites hacked by Cyber pr3dat0r (Team StuXnet)

3 Websites hacked by Cyber pr3dat0r (Team StuXnet)

Jan 21, 2011
3 Websites hacked by Cyber pr3dat0r (Team StuXnet) Hacked Links :  https://www.vendstream.com/portals/0/cyber.txt https://www.hqex.net/index.html https://www.pumpsandpressure.com/portals/0/cyber.txt News Source : Cyber pr3dat0r (Team StuXnet) | Via Message
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Find and Fix the Gaps in Your Security Tools

websitePrelude SecuritySecurity Control Validation
Connect your security tools for 14-days to find missing and misconfigured controls.
Sri Lanka Army Tender Management System's site Hacked By Pakistan Cyber Warrior !!

Sri Lanka Army Tender Management System's site Hacked By Pakistan Cyber Warrior !!

Jan 21, 2011
Sri Lanka Army Tender Management System 's site Hacked By Pakistan Cyber Warrior !! Site link :  https://tender.army.lk/
2 Indian websites Hacked By Team Flawless (Pakistan Hackers) !

2 Indian websites Hacked By Team Flawless (Pakistan Hackers) !

Jan 21, 2011
2 Indian websites Hacked By Team Flawless(Pakistan Hackers) ! Links:: https://ktvchannel.in/TeamFlawless.htm https://www.sixer.in/pictures/vids_api/TeamFlawless814.htm Mirrors: https://zone-h.org/mirror/id/12930377 https://mirror-az.com/mirror/?id=9810 https://mirror-az.com/mirror/?id=9809 News Source : aBu-HurrerA | Via Email
Punjab Education Department E-mail Hacked !!

Punjab Education Department E-mail Hacked !!

Jan 21, 2011
Hoshiarpur : In an incident that has left teachers in schools in Hoshiarpur district of Punjab face red, the official email address of the school board here has been pirated and pornographic material was distributed to 400 public schools in the district. "We are using this e-mail address to send notifications and important information to schools in Hoshiarpur. This is a case of cyber-attack as someone sent pornographic material to all schools after hacking the e-mail, Sukhwinder Kaur, Deputy District Education Director (WD), Hoshiarpur, told IANS. After the accident, the police made an appeal DEO. "It was really embarrassing that the majority of teachers in computer services at the school are women. These things are not tolerable, and we are all shocked by this incident. Upon receipt of this information, he immediately instructed schools not to open emails mails sent from this address, "said Kaur. Sources indicate that the attacker has sent between 15 and 20 em...
Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

Jan 21, 2011
What is the future of political protest, as in a highly digitized world? We follow the real-time display via Wikileaks Cablegate. The day of the cables has been convicted for release in major newspapers worldwide, called a "political hack" cut the Wikileaks site with a distributed denial of service (DDoS). Later he wrote about Twitter that he went after the site for "attempting to give life to our troops and other assets." Wikileaks Swedish webhost moved the site owned by Amazon.com and Elastic Computing Cloud (EC2) in Ireland. When Senator Joseph Lieberman contact the hosting site, Amazon, Amazon Wikileaks to stop the service, citing terms of use. Then the free-for-all began. The pirates were involved, this time on behalf of Wikileaks, directed to Amazon. When PayPal froze payments to Wikileaks, the anonymous group of hackers, who organized the attacks on Amazon, focusing on reducing the site to pay online. When MasterCard announced that it would cease opera...
Where To Buy Your Tools From Hackers ?

Where To Buy Your Tools From Hackers ?

Jan 21, 2011
Software that facilitates the attack by beginners online scammers and the future is big business anarchists, says Karlin Lillington The suites are equipped with new software with all the trappings of modern software now offers: cloud computing hosting, software as a service (SaaS) functions, outsourcing, digital certificates, licenses to prevent piracy, software modules, and provided services and support packages. But the difference between these programs - listed in the Internet Relay Chat rooms, instant chat (IRC) and private online forums - and what it could buy public providers is that they offer more software piracy increasingly sophisticated for simple - young hackers with little ability to write their own computer code. "Lessons learned from large companies legitimate software - such as development practices, techniques and anti-piracy, support and prices - are regularly repeated in the informal economy, in order to increase efficiency and profits, says the safety re...
Expert Insights Articles Videos
Cybersecurity Resources