#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

The Anonymous : Need of  21st century !

The Anonymous : Need of 21st century !

May 12, 2011
The Anonymous : Need of  21st century ! Anonymous is the political movement of change for the 21st century. Anonymous can and certainly will accomplish what many other political and peace movements of the past could not. How will they achieve this? Through peaceful protest. When corruption, destruction and mayhem strikes from governments or corporations it is the goal of anonymous to awaken that entity and the public that a change must occur. Given that, many will use the name Anonymous to perform acts of a criminal and malicious nature. By doing this it gives the real " Anonymous " a bad name. In fact, governments and corporations will try to retaliate against the false anon by restricting internet freedom and user capabilities. We must understand that the Anonymous who strives for political change and world peace must be free to work without the mistrust and misdeeds of others who tarnish their good work. As price pritchet once said, " change always c...
New Facebook worm propagating : VERIFY MY ACCOUNT , Video Explanation of code !

New Facebook worm propagating : VERIFY MY ACCOUNT , Video Explanation of code !

May 12, 2011
New Facebook worm propagating : VERIFY MY ACCOUNT , Video Explanation of Code In the past hour a new application has begun spreading on Facebook which has found an exploit in the existing sharing system. Whatever you do, don't click the link described below. The system is pretty straight forward. It suggests that you click "VERIFY MY ACCOUNT" within a link which ultimately results in the user posting the same message to all their friends' walls. The message typically resembles the following one: Scam Signature Message:  In order to PREVENT SPAM, I ask that you VERIFY YOUR ACCOUNT. Click VERIFY MY ACCOUNT right next to comment below to start the process… The result is that thousands of users have seen the message spreading to their profiles in the past hour or so. Our guess is that this message could reach hundreds of thousands of users before it's shut down (unless Facebook's security team is up right now). The bottom line is this: don't click any of the links resembling t...
Preview : Web App Hacker's Handbook 2nd Edition !

Preview : Web App Hacker's Handbook 2nd Edition !

May 12, 2011
Preview : Web App Hacker's Handbook 2nd Edition ! The first draft of the new edition of WAHH is now completed, and the lengthy editing and production process is underway. Just to whet everyone's appetite, I'm posting below an exclusive extract from the Introduction, describing what has changed in the second edition. (And in a vain attempt to quell the tidal wave of questions: the book will be published in October; there won't be any more extracts; we don't need any proof readers, thanks.) What's Changed in the Second Edition? In the four years since the first edition of this book was published, much has changed and much has stayed the same. The march of new technology has, of course, continued apace, and this has given rise to specific new vulnerabilities and attacks. The ingenuity of hackers has also led to the development of new attack techniques, and new ways of exploiting old bugs. But neither of these factors, technological or human, has created a rev...
cyber security

The MCP Security Guide for Early Adopters

websiteWizArticles Intelligence / MCP Security
Thousands of MCP servers are already live, but most security teams don't have a clear strategy yet. Get the practical guide to MCP for security teams.
cyber security

How Security Leaders, like Snowflake's CISO, are Securing Unmanaged Devices

websiteBeyond IdentityIdentity Security / Enterprise Protection
Unmanaged devices fuel breaches. Learn 5 ways CISOs secure them without hurting productivity.
275 Sites Hacked by jumbo (Umer Rock)

275 Sites Hacked by jumbo (Umer Rock)

May 12, 2011
275 Sites Hacked by jumbo (Umer Rock) Sites: https://pastie.org/1891679 mirror: https://mirror.sec-t.net/hacker/?s=1&user=Umer+Rock
Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download !

Finally Source code of ZeuS Botnet Version: 2.0.8.9 available for Download !

May 11, 2011
Finally Source code of ZeuS Botnet Version: 2.0.8.9  available for Download ! Download Link :  https://www.multiupload.com/P8QUNF4YJN Rar password : zeus Read More :  Complete ZeuS source code has been leaked ! ' The Hacker News ' Magazine -   Social Engineering Edition  - Issue 02 - May,2011 Released ! Download Now
Wikileaks Founder, Assange gets Sydney Peace Prize !

Wikileaks Founder, Assange gets Sydney Peace Prize !

May 11, 2011
Wikileaks Founder, Assange gets Sydney Peace Prize ! WikiLeaks founder Julian Assange was Wednesday awarded the Sydney Peace Foundation's top honor for "exceptional courage in pursuit of human rights," joining the likes of Nelson Mandela and the Dalai Lama. Assange, an Australian former computer hacker who is fighting extradition from Britain to Sweden over alleged sex crimes, was praised and rewarded with the Sydney Peace Prize's Gold Medal. Although the Peace Prize is awarded annually by the foundation only three other people in its 14-year history have been awarded the gold award for courage in pursuit of human rights -- the Dalai Lama, Nelson Mandela and Japanese Buddhist leader Daisaku Ikeda. The foundation paid tribute to Assange's determination to seek greater transparency and accountability from governments around the world, having challenged "centuries old practices of government secrecy." "By championing people's right to k...
Hacked PlayStation Network to be fully restored by end of May !

Hacked PlayStation Network to be fully restored by end of May !

May 11, 2011
Hacked PlayStation Network to be fully restored by end of May ! Sony said Tuesday it aimed to fully restore its PlayStation Network, shut down after a massive security breach affecting more than 100 million online accounts, by the end of May. Sony also confirmed that personal data from 24.6 million user accounts was stolen in the hacker attack last month. Personal data, including credit card numbers, might have been stolen from another 77 million PlayStation accounts, said Sony Computer Entertainment Inc. spokesperson Satoshi Fukuoka. He said Sony has not received any reports of illegal uses of stolen information, and the company is continuing its probe into the hacker attack. He declined to give details on the investigation. Sony shut down the PlayStation network, a system that links gamers worldwide in live play, on April 20 after discovering the security breach. The network also allows users to upgrade and download games and other content. Sony was under heavy criticism o...
ICSE Guess compromised, over 1 lakh 10 thousand users hacked by lionaneesh !

ICSE Guess compromised, over 1 lakh 10 thousand users hacked by lionaneesh !

May 11, 2011
ICSE Guess compromised, over 1 lakh 10 thousand users hacked by lionaneesh ! Admin User/Pass leaked By Indian hacker Loinaneesh. There are more than 1 lakh 10 thousand users data stolen. Big sites, Less Security :P
Expert Insights Articles Videos
Cybersecurity Resources
//]]>