#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Google Chrome Gets Updates: New Interfaces, Faster Browsing !

Google Chrome Gets Updates: New Interfaces, Faster Browsing !

Mar 09, 2011
Tuesday, Google announced a few changes to Chrome, its engineered-for-speed web browser. The super-fast beta version that was announced a few weeks ago has already been updated to a stable version. For the Googlers working on Chrome, speed entails not only faster code (the latest version of Chrome boasts a 66% improvement in JavaScript performance) but also easier-to-navigate interfaces. With that in mind, the company is rolling out a new Settings interface for all Chrome users. One major change is that Settings are now presented in a Chrome tab rather than a dialog box — a change that will seem familiar to those using Google's Cr-48 notebooks, which run Chrome OS and present absolutely everything in a browser tab. Settings are also searchable, which many users will likely find extremely helpful. Here's a brief demo video showing Chrome's new Settings pages in action: Google has also extended its sandboxing features to Chrome's Flash player. Interested parties can download...
New Metasploit 3.6 Targets Security Compliance !

New Metasploit 3.6 Targets Security Compliance !

Mar 09, 2011
Security vulnerability testing is getting a boost this week with the release of Metasploit 3.6. Metasploit Pro, the commercial version of the product, now includes new PCI compliance reporting capabilities. There is also a new Project Activity Report, which helps organization manage and track penetration testing activities. While there have been improvements to the commercial tool, open source users also benefit from some of the work done on Metasploit Pro 3.6 "The work behind the Pro Console actually resulted in major usability improvements to the standard Metasploit Framework console," said HD Moore, chief security officer at Rapid7 and Metasploit's chief architect. "All 64 of the new modules (including 15 exploits) are available in the open source version as well as the commercial products."
#OperationPayback , Next Target Bmi.com by Anonymous Hackers !

#OperationPayback , Next Target Bmi.com by Anonymous Hackers !

Mar 09, 2011
#OperationPayback , Next Target Bmi.com by Anonymous Hackers ! Operation Payback's third target since its revival is www.bmi.com We will not rest until our demands our met. We are Anonymous We are Legion We do not Forgive We do not Forget Expect Us News Source : Anonymous :P
cyber security

Master SaaS AI Risk: Your Complete Governance Playbook

websiteReco AIArtificial Intelligence / SaaS Security
95% use AI, but is it secure? Master SaaS AI governance with standards-aligned frameworks.
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Designing Identity for Trust at Scale—With Privacy, AI, and Seamless Logins in Mind

Jul 24, 2025
Is Managing Customer Logins and Data Giving You Headaches? You're Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let's be honest, we're also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing to everything from how we log in to spotting online fraud, and it's a whole new ball game! If you're dealing with logins, data privacy, bringing new users on board, or building digital trust, this webinar is for you . Join us for " Navigating Customer Identity in the AI Era ," where we'll dive into the Auth0 2025 Customer Identity Trends Report . We'll show you what's working, what's not, and how to tweak your strategy for the year ahead. In just one session, you'll get practical answers to real-world challenges like: How AI is changing what users expect – and where they're starting to push ba...
Women's day website hacked !

Women's day website hacked !

Mar 09, 2011
DENIAL OF SERVICE: HACKERS BROUGHT down the International Women's Day website yesterday. Three separate "denial-of-service" attacks were directed at the internationalwomensday.com website, the organisers said. "As the centenary of International Women's Day struck in the Asia Pacific region, perpetrators commenced attacking the internationalwomensday.com website in an explicit attempt to prevent users from accessing the global hub for International Women's Day," a statement on the site said. The site expected more than 100,000 visitors yesterday and has recently had about 25,000 users a day. According to the women's day organisers, the website was the target of "a massive five gigabytes per second" directed at the site in an attempt to prevent "legitimate users" from accessing it. Denial-of-service attacks commonly involve bombarding the target with a huge number of external requests in order to prevent the intended users gaining access. "These type of attacks have brought ...
Warner Bros. to deliver movies on Facebook !

Warner Bros. to deliver movies on Facebook !

Mar 08, 2011
Warner Bros. is apparently hoping to attract new fans by offering movies for viewing on Facebook. The movie studio announced this evening it would begin testing a program that would offer movies for sale or rental for a brief period through its fan pages on the social-networking giant. Beginning tomorrow, Facebook users can use Facebook Credits to rent "The Dark Knight" through the movie's official fan page on the social-networking site, Warner said in statement. The movie can be rented for 30 Facebook credits or $3, and Facebook users will have access to the movie for 48 hours through their accounts on the social network. Facebook Credits is an alternative payment option for more than 150 games and applications on the social network. It's supported by games such as FarmVille and Mafia Wars, as well as Bejeweled Blitz and Madden NFL Superstars. Most titles still allow gamers to pay with credit cards, but it's Facebook's hope that eventually, users will buy a...
Make Your Own Real Android Robot !

Make Your Own Real Android Robot !

Mar 08, 2011
Android's little green robot mascot is pretty cute. Even one of Apple's biggest fans could admit he's cooler than a slightly bitten fruit. So seeing how commonly hacked Android is, when Instructables member Tanabata decided to hack a figurine to make it responsive--the Android robot is, of course, the natural choice. Tanabata's Mechanized Android Figure moves its head, displays light patterns, reacts to sound, and can send out messages in morse code. His model is from DYZPLASTIC, but you could use this hack on and figurine you have lying around that you don't mind altering. From there. you're going to need a whole lot of supplies--think four types of LED and resistors, plastic and metal micro servos, a Piezo and power supply to name but a few. Fortunately the full instructions and shopping list (with links!) are available on Instuctables to follow. After a bit of wiring (remembering to keep things small) all the gear up, then prising open the firgurine to ad...
Most Websites Vulnerable To Attack !

Most Websites Vulnerable To Attack !

Mar 08, 2011
The average website has serious vulnerabilities more than nine months of the year, according to a new report issued yesterday. According to a study issued by researchers at WhiteHat Security, the average site is exposed about 270 days of the year. "Information Leakage" has replaced Cross-Site Scripting (XSS) as the most common website vulnerability, the report says. The report examined data from more than 3,000 websites across 400 organizations that are continually tested for vulnerabilities by WhiteHat Security's Sentinel service. The study offers a look at sites' "Window of Exposure," which measures not only the vulnerabilities found in sites, but the length of time it takes those vulnerabilities to be remediated. "It's inevitable that websites will contain some faulty code -- especially in sites that are continually updated. Window of Exposure is a useful combination of the vulnerability prevalence, the time it takes to fix vulnerabilities, and...
Hacker sends teen's half-naked photo to Facebook, e-mail contacts !

Hacker sends teen's half-naked photo to Facebook, e-mail contacts !

Mar 08, 2011
BREMERTON  — The partially naked photograph of a Bremerton teenager has managed to circulate to her e-mail contacts, teachers and even to colleges where she'd applied to school, according to Bremerton police reports. The girl said she'd sent a picture of herself wearing only underwear to her boyfriend about six months ago, police said. Recently, her computer has had problems and she believes it may have been hacked. She then discovered the photo, which was on the computer, had gone out to her e-mail contacts and asked police to investigate. Bremerton detectives are on the case. Anyone with information is asked to call 911.
Expert Insights Articles Videos
Cybersecurity Resources
//]]>