#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Indian Hacker shared his video of hacking Microsoft Kinect Xbox to control Tata Sky !

Indian Hacker shared his video of hacking Microsoft Kinect Xbox to control Tata Sky !

Feb 18, 2011
The desire of remote free experience urged Harishankar Narayan a mechanical Engineer to hack into the Microsoft Kinect Xbox and control Tata Sky through Kinetic Movements. In a You Tube video which he has uploaded the man is seen controlling the Tata Sky with the movements of his hands. The mechanical Engineer said that he wanted a remote free experience which led him to fiddle with the remote of Microsoft's Kinect Xbox and by trying and retrying he finally hacked into it to recreate his own codes. He says that he wants every appliance in his home to work according to his gestures. The man built the whole system with keeping in mind the minute details possible like hew had a device called USB UIRP which he connected to his MacMini. The USB acted as a detector of infrared signal and also was a universal remote for all the gadgets. The USB detected the infrared signals for the Tata Sky remote and then from there he set gestures or movemnts to control the Tata Sky. The hack sta...
Chinese hackers targeted House of Commons !

Chinese hackers targeted House of Commons !

Feb 18, 2011
Chinese hackers not only attacked key federal departments: they also cracked into the computer system of the House of Commons, targeting MPs with large ethnic Chinese constituencies, CTV News has learned. Sources say Canada's secret cyber spy agency -- the Communications Security Establishment -- tracked the hacking operation to the Chinese embassy in Ottawa and to computer servers in Beijing. Toronto MP Derek Lee said Canada needs to show it's capable of fighting back. "It's unacceptable and I think we should hold out some threat -- a counter-strike threat," he said. But Canada might be falling behind when it comes to defending -- and retaliating -- against such attacks. Britain spends $1 billion on cyber security and the United States $55 billion, while Canada has a budget of $90 million. Meanwhile, security experts say the Chinese hackers who have targeted Canadian government computers are just the latest in a wave of cyberspace spies, and Ottawa needs to bols...
Nokia under scanner of Indian Intelligence Agency for its Push Email service and SMS !

Nokia under scanner of Indian Intelligence Agency for its Push Email service and SMS !

Feb 18, 2011
Department of Telecommunication (DOT) has been asked by The Intelligence Bureau (IB0) to stop the messaging services of Nokia in India until they can be monitored. Once again security concerns have clouded Intelligence department's mind and the incident is not first of its kind. Earlier too similar concerns have cropped up and warnings being sent against Skype, Google's Gmail and BlackBerry. The Intelligence Bureau has communicated to DoT saying that Nokia's push email services for customers and corporate should be discontinued until the Finnish company gives them monitoring access. Intelligence Bureau (IB) has written a letter to telecom department in which it has raised concerns over security and has asked to make monitoring arrangements. Meanwhile the Intelligence agencies are upset over Nokia's adamant behavior as the company still advertises its push email services in the market. But Nokia countered the allegations by the agencies and said, "Our messaging offering is still in t...
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
The Unusual Suspect: Git Repos

The Unusual Suspect: Git Repos

Jul 14, 2025Secrets Management / SaaS Security
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping code, developers may inadvertently leave behind API keys, tokens, or passwords in configuration files and code files, effectively handing attackers the keys to the kingdom. This isn't just about poor hygiene; it's a systemic and growing supply chain risk. As cyber threats become more sophisticated, so do compliance requirements. Security frameworks like NIS2, SOC2, and ISO 27001 now demand proof that software delivery pipelines are hardened and third-party risk is controlled. The message is clear: securing your Git repositories is no longer optional, it's essential. Below, we look at the ris...
Canadian Prime Minister Stephen Harper promises action on cyber attacks !

Canadian Prime Minister Stephen Harper promises action on cyber attacks !

Feb 18, 2011
OTTAWA Federal security agencies are working to deal with cyber threats, Prime Minister Stephen Harper said Thursday. He wouldn't speak directly to what the government calls an "unauthorized attempt" to access computer networks at the Treasury Board. The attack left civil servants in key departments without Internet access. Jay Denney, a spokesperson for Treasury Board president Stockwell Day, said security officials have taken action against the threat in line with the government's security policy. "There are no indications that any data relating to Canadians was compromised by this unauthorized attempt," said Denney. Details of the federal budget, expected to be delivered next month, are also apparently still secret.
Social networks to be monitored by Mumbai police to keep a check on hate pages !

Social networks to be monitored by Mumbai police to keep a check on hate pages !

Feb 18, 2011
After observing an increase in the number of phishing attacks and several other cyber crimes, the cyber police have intensified patrolling of the social networking sites. Police, with the help of IT experts, will keep a check on any hate posts or groups created in cyberspace. The action reportedly came after the recent incident where Dr Babasaheb Ambedkar's picture was defaced and it lead to riots in the Khar on Tuesday. Websites are patrolled round the clock to check for any objectionable content. Pages or groups that harm the sensitivities of people could be removed or the website could be brought down to avoid any incidents that could affect the law and order situation. All such hate postings will be forwarded to the India Computer Emergency Response Team (ICERT), a government body working under the ministry of information technology. The ICERT will then take up the matter to its logical conclusion by sending communication to these networking sites, asking them to block or remove t...
Operation Bahrain ( #opbahrain ) - Anonymous Press Release !

Operation Bahrain ( #opbahrain ) - Anonymous Press Release !

Feb 17, 2011
Operation Bahrain ( #opbahrain ) - Anonymous Press Release ! Dear Free-Thinking Citizens of THE WORLD,  The Bahrainian government has shown by its actions that it intends to  brutally enforce its reign of injustice by limiting free speech and  access to truthful information to its citizens and the rest of the  world. It is time to call for an end to this oppressive regime. The most  basic human right is the transparency of one's government, and  Bahrain's is no exception. By interfering with the freedom to hold peaceful protests, the Bahrainian  government has made itself a clear enemy of its own citizens and of  Anonymous. The actions of this regime will not be forgotten, nor will  they be forgiven.   When people are faced with such injustices, Anonymous hears those cries, and  we will assist in bringing to justice those who commit criminal acts  against the innocent. We will not remain silent and let these crimes...
China hackers attack Canadian Government Computer Systems !

China hackers attack Canadian Government Computer Systems !

Feb 17, 2011
Foreign hackers successfully penetrated the computer systems of the Canadian federal government. Last month was the first sign that the system had been compromised. The attacks, said to have come from China, hit both the Finance Department and the Treasury Board. Although no statements have been made aside from the government saying that there was an "attempt to access", the CBC's sources confirm that the hackers were able to remotely control computers in the offices of senior government executives, hoping to unlock entire government data systems. After realizing what had happened, government security officials immediately brought both departments offline. We haven't been informed whether anything was taken but CBC mentioned that its "Highly placed sources" told them that the  "cyberattacks were traced back to computer servers in China" but, really a hacker could likely make it appear to come from any server around the world. We're looking into this and we'll update if and when we...
BBC music websites get hacked !

BBC music websites get hacked !

Feb 17, 2011
THE BBC'S MUSIC WEBSITES have been hacked to stream malware using drive-by downloads for anyone browsing the infected webpages. Hackers set the drive-by malware up at the BBC's 6 Music website and the BBC 1Xtra radio station website. Researchers at the insecurity outfit Websense found the exploits and put its report up on its security labs blog. "The BBC - 6 Music Web site has been injected with a malicious iframe, as have areas of the BBC 1Xtra radio station Web site," an anonymous Websense insecurity researcher wrote. Websense claims the injected iframe is at the bottom of the BBC 6 Music webpage and has been set up to automatically download some dodgy code from a .cc website. Apparently the hack is exactly the same on the BBC's 1Xtra website. "If an unprotected user browsed to the site they would be faced with drive-by downloads, meaning that simply browsing to the page is enough to get infected with a malicious executable," Websense continued. ...
Expert Insights Articles Videos
Cybersecurity Resources