#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Google Chrome Gets Updates: New Interfaces, Faster Browsing !

Google Chrome Gets Updates: New Interfaces, Faster Browsing !

Mar 09, 2011
Tuesday, Google announced a few changes to Chrome, its engineered-for-speed web browser. The super-fast beta version that was announced a few weeks ago has already been updated to a stable version. For the Googlers working on Chrome, speed entails not only faster code (the latest version of Chrome boasts a 66% improvement in JavaScript performance) but also easier-to-navigate interfaces. With that in mind, the company is rolling out a new Settings interface for all Chrome users. One major change is that Settings are now presented in a Chrome tab rather than a dialog box — a change that will seem familiar to those using Google's Cr-48 notebooks, which run Chrome OS and present absolutely everything in a browser tab. Settings are also searchable, which many users will likely find extremely helpful. Here's a brief demo video showing Chrome's new Settings pages in action: Google has also extended its sandboxing features to Chrome's Flash player. Interested parties can download...
New Metasploit 3.6 Targets Security Compliance !

New Metasploit 3.6 Targets Security Compliance !

Mar 09, 2011
Security vulnerability testing is getting a boost this week with the release of Metasploit 3.6. Metasploit Pro, the commercial version of the product, now includes new PCI compliance reporting capabilities. There is also a new Project Activity Report, which helps organization manage and track penetration testing activities. While there have been improvements to the commercial tool, open source users also benefit from some of the work done on Metasploit Pro 3.6 "The work behind the Pro Console actually resulted in major usability improvements to the standard Metasploit Framework console," said HD Moore, chief security officer at Rapid7 and Metasploit's chief architect. "All 64 of the new modules (including 15 exploits) are available in the open source version as well as the commercial products."
#OperationPayback , Next Target Bmi.com by Anonymous Hackers !

#OperationPayback , Next Target Bmi.com by Anonymous Hackers !

Mar 09, 2011
#OperationPayback , Next Target Bmi.com by Anonymous Hackers ! Operation Payback's third target since its revival is www.bmi.com We will not rest until our demands our met. We are Anonymous We are Legion We do not Forgive We do not Forget Expect Us News Source : Anonymous :P
cyber security

Secure your LLMs Against Real-World Threats

websiteWizLLM Security / Artificial Intelligence
LLMs move fast. So do the risks. Get practical, real-world steps to defend against prompt injection, model poisoning, and more.
cyber security

2025 Gartner® MQ Report for Endpoint Protection Platforms (July 2025 Edition)

websiteSentinelOneEndpoint Protection / Unified Security
Compare leading Endpoint Protection vendors and see why SentinelOne is named a 5x Leader
Women's day website hacked !

Women's day website hacked !

Mar 09, 2011
DENIAL OF SERVICE: HACKERS BROUGHT down the International Women's Day website yesterday. Three separate "denial-of-service" attacks were directed at the internationalwomensday.com website, the organisers said. "As the centenary of International Women's Day struck in the Asia Pacific region, perpetrators commenced attacking the internationalwomensday.com website in an explicit attempt to prevent users from accessing the global hub for International Women's Day," a statement on the site said. The site expected more than 100,000 visitors yesterday and has recently had about 25,000 users a day. According to the women's day organisers, the website was the target of "a massive five gigabytes per second" directed at the site in an attempt to prevent "legitimate users" from accessing it. Denial-of-service attacks commonly involve bombarding the target with a huge number of external requests in order to prevent the intended users gaining access. "These type of attacks have brought ...
Warner Bros. to deliver movies on Facebook !

Warner Bros. to deliver movies on Facebook !

Mar 08, 2011
Warner Bros. is apparently hoping to attract new fans by offering movies for viewing on Facebook. The movie studio announced this evening it would begin testing a program that would offer movies for sale or rental for a brief period through its fan pages on the social-networking giant. Beginning tomorrow, Facebook users can use Facebook Credits to rent "The Dark Knight" through the movie's official fan page on the social-networking site, Warner said in statement. The movie can be rented for 30 Facebook credits or $3, and Facebook users will have access to the movie for 48 hours through their accounts on the social network. Facebook Credits is an alternative payment option for more than 150 games and applications on the social network. It's supported by games such as FarmVille and Mafia Wars, as well as Bejeweled Blitz and Madden NFL Superstars. Most titles still allow gamers to pay with credit cards, but it's Facebook's hope that eventually, users will buy a...
Make Your Own Real Android Robot !

Make Your Own Real Android Robot !

Mar 08, 2011
Android's little green robot mascot is pretty cute. Even one of Apple's biggest fans could admit he's cooler than a slightly bitten fruit. So seeing how commonly hacked Android is, when Instructables member Tanabata decided to hack a figurine to make it responsive--the Android robot is, of course, the natural choice. Tanabata's Mechanized Android Figure moves its head, displays light patterns, reacts to sound, and can send out messages in morse code. His model is from DYZPLASTIC, but you could use this hack on and figurine you have lying around that you don't mind altering. From there. you're going to need a whole lot of supplies--think four types of LED and resistors, plastic and metal micro servos, a Piezo and power supply to name but a few. Fortunately the full instructions and shopping list (with links!) are available on Instuctables to follow. After a bit of wiring (remembering to keep things small) all the gear up, then prising open the firgurine to ad...
Most Websites Vulnerable To Attack !

Most Websites Vulnerable To Attack !

Mar 08, 2011
The average website has serious vulnerabilities more than nine months of the year, according to a new report issued yesterday. According to a study issued by researchers at WhiteHat Security, the average site is exposed about 270 days of the year. "Information Leakage" has replaced Cross-Site Scripting (XSS) as the most common website vulnerability, the report says. The report examined data from more than 3,000 websites across 400 organizations that are continually tested for vulnerabilities by WhiteHat Security's Sentinel service. The study offers a look at sites' "Window of Exposure," which measures not only the vulnerabilities found in sites, but the length of time it takes those vulnerabilities to be remediated. "It's inevitable that websites will contain some faulty code -- especially in sites that are continually updated. Window of Exposure is a useful combination of the vulnerability prevalence, the time it takes to fix vulnerabilities, and...
Hacker sends teen's half-naked photo to Facebook, e-mail contacts !

Hacker sends teen's half-naked photo to Facebook, e-mail contacts !

Mar 08, 2011
BREMERTON  — The partially naked photograph of a Bremerton teenager has managed to circulate to her e-mail contacts, teachers and even to colleges where she'd applied to school, according to Bremerton police reports. The girl said she'd sent a picture of herself wearing only underwear to her boyfriend about six months ago, police said. Recently, her computer has had problems and she believes it may have been hacked. She then discovered the photo, which was on the computer, had gone out to her e-mail contacts and asked police to investigate. Bremerton detectives are on the case. Anyone with information is asked to call 911.
Expert Insights Articles Videos
Cybersecurity Resources
//]]>