#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

HTC HD Mini Gets Hacked, Now Runs Android !

HTC HD Mini Gets Hacked, Now Runs Android !

Feb 19, 2011
The HTC HD Mini, also previously known as Photon, is pretty old as far as smartphones go--the Windows Mobile 6.5 phone was first released back in February 2010. So a XDA Developer member has given the cellphone a new lease of life by bringing Android and Linux OS to it. Forum member "Cotulla" managed to get the HD Mini running Android via the Haret Launcher, a file used commonly to boot Android on Windows Mobile phones. The ROM for the hack was created from similar HTC handset HTC Aria, which can be booted from a SD card. Add the files (Cotulla made a developer file and a user file, so pick your camp), launch Haret, and Android for HD Mini is yours! Sadly, the Linux OS is far from complete. Although the hack is up and running, it's not without it's problems. The battery driver doesn't work, and neither does the GSensor or WLAN. Some of the touchscreen buttons are also not perfectly aligned, so need a bit of work. Unfortunately, Cotulla is no longer working on...
Joe Jonas's Twitter Got Hacked !!

Joe Jonas's Twitter Got Hacked !!

Feb 19, 2011
Joe Jonas braves the rain to go shopping at Fred Segal with a pal on Friday (February 18) in West Hollywood, Calif. The same day, the 21-year-old singer's girlfriend, Ashley Greene, was spotted at LAX grabbing some Starbucks at LAX. Joe recently had to deal with some problems on his Twitter page. "Someone hacked my account. I did not RT that ocean up article and would never RT something like that. Looking into my account security," he tweeted.
Manchu Manoj Email ID Hacked !

Manchu Manoj Email ID Hacked !

Feb 19, 2011
Collection king  Mohanbabu's son Manchu Manoj's email id was hacked last week. The star who came back from USA recently after treatment for his arm injury was in for a shock when his email id was hacked. Sources say the hacker even chat with Manoj's friends online. Manoj rectified the problem but the email id was hacked again. Though his bank accounts and other financial transactions are not operated from that email id, the star was amazed at the technological advancement in hacking his email id twice in one week. However, he has not lodged any complaint against the hackers yet with City Cyber Crime department. Meanwhile, he is gearing up to do Uukodathara Ulikkipadathara in his home production Lakshmi Prasanna Pictures which will go on floors next month.
cyber security

New Webinar: Identity Attacks Have Changed — Have Your IR Playbooks?

websitePush SecurityThreat Detection / Identity Security
With modern identity sprawl, the blast radius of a breach is bigger than ever. Are you prepared? Sign up now.
Securing Agentic AI: How to Protect the Invisible Identity Access

Securing Agentic AI: How to Protect the Invisible Identity Access

Jul 15, 2025Automation / Risk Management
AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can't easily see. These "invisible" non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have become one of the ripest targets for attackers. Astrix's Field CTO Jonathan Sander put it bluntly in a recent Hacker News webinar : "One dangerous habit we've had for a long time is trusting application logic to act as the guardrails. That doesn't work when your AI agent is powered by LLMs that don't stop and think when they're about to do something wrong. They just do it." Why AI Agents Redefine Identity Risk Autonomy changes everything: An AI agent can chain multiple API calls and modify data without a human in the loop. If the underlying credential is exposed or overprivileged, each addit...
Online security losing cyber battle !

Online security losing cyber battle !

Feb 19, 2011
THE internet was never meant to do sensitive banking transactions, cyber criminals are winning the war against online security and Australia's easy going nature is making us vulnerable targets to ever-more sophisticated internet thugs. That was San Francisco-based internet security watcher and author Joseph Menn's assessment of the current state of the internet before he spoke to the Internet Industry Association's gala dinner in Sydney last night. The only glimmer of hope was that people were becoming more aware of the risks involved with the internet - which he described as a "loaded gun" - but we have to be even more savvy if we are not to be become a cyber crime victim. Mr Menn said when he interviewed the former head of the US Department of Justice's Cyber Crime Unit she said half of all credit cards were in the hands of criminals. "And if your credit card details weren't in criminals' hands it was only because they hadn't got around to...
Operation Freedom ( OpFreedom ) - Press Release By Anonymous Hackers !

Operation Freedom ( OpFreedom ) - Press Release By Anonymous Hackers !

Feb 18, 2011
Operation Freedom ( OpFreedom )   Press Release By Anonymous Hackers ! NOTE : One More Press Released By Anonymous Hackers on there official site/Facebook/Twitter. We are Publishing This news, just as the Media of "Hacking Field" . These is No relation b/w 'The Hacker News' & 'Anonymous Hackers'. We are Anonymous. We are everywhere. And we fight for freedom. We fight for free speech.  We fight against censorship.  Together with the citizens of the world we are strong.  The actions of the  regimes will not be forgotten, nor will  they be forgiven. Anonymous hears those cries, and  we will assist in bringing to justice those who commit criminal acts  against the innocent. We will not remain silent and let these crimes  against humanity continue. Say no to Censorship and dictatorship. Join Us. Spread news.  Al Jazzera Live Stream Twitter IRC We are Anonymous. We are legion. We do not forgive. We do not forget. Expect us. A...
Yemen, Bahrain, Iran could be next Egypt ,Anonymous Stand With Justice & Truth !

Yemen, Bahrain, Iran could be next Egypt ,Anonymous Stand With Justice & Truth !

Feb 18, 2011
U.S. officials, while declining to point to a single country that could follow Tunisia and Egypt into regime change, say they believe there are three countries whose protests could, under some circumstances, reach that same level of intensity. The officials cited Yemen, Bahrain and Iran (not necessarily in that order) as being in a separate category from the rest of the Middle East nations. There may be protests and demonstrations in the other countries, but the protests are less widespread or more likely to be put down by brutal state security forces, U.S. officials said. Here's a country-by-country assessment drawn from the accounts of U.S. officials: Yemen: plenty of kindling Yemen has been facing daily protests, and the nation is fraught with all sorts of issues: deep poverty and unemployment, a strong belief that the society is inherently corrupt, an active al-Qaida presence, and an unpopular ruler, who's been in power almost as long as Presidents Ben Ali and Mubarak in...
Anonymous Hackers Help Iranian Activists Fight The Regime !

Anonymous Hackers Help Iranian Activists Fight The Regime !

Feb 18, 2011
The inscrutable "voice" of international Internet collective Anonymous, a shadowy organization that has carried out a number of attacks on websites worldwide. In recent days, with Iranians taking to the streets to protest the government, the country's Islamic authorities have boosted their censorship efforts in a bid to crush opposition activity online. Before and during the largest demonstrations seen in Iran since the unrest that followed President Mahmud Ahmadinejad's disputed reelection in June 2009, the authorities have tried to tamp down opposition activity by blocking opposition websites and other media, as well as disrupting mobile phone connections. This is where Anonymous and its "Operation: Iran" come in. The collective is providing users with special advice forums and tools to fight the Iranian government's censorship. The group has also encouraged Iranian users to use distributed denial of service attacks (DDOS) in order to take dow...
Emailrevealer.com Launches New Email Hacking Investigation service !

Emailrevealer.com Launches New Email Hacking Investigation service !

Feb 18, 2011
EmailRevealer.com  the Colorado based private investigation firm specializing in cyber stalking intervention and email tracing, has added Email Hacking Investigations to their investigative tool box. EmailRevealer's Email Hacking Investigations, available through their web site at  www.emailrevealer.com , can monitor a clients email account, identify any unauthorized access to that account and obtain identifying information to locate and or identify the person hacking into that email account and invading the account owners privacy. Ed Opperman, President Of Opperman Investigations Inc the owner of  EmailRevealer.com , shares how these new advancements in email account security were developed. - "We have probably spent more man hours investigating emails than any other PI agency on Earth. We investigate cyber stalkers, Internet defamation and even developed a unique investigation service where we can trace an email back to a secret online personals ad on a dating s...
Expert Insights Articles Videos
Cybersecurity Resources