-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

OECD said Cyber attacks could create 'perfect strom' !!

OECD said Cyber attacks could create 'perfect strom' !!

Jan 19, 2011
Attacks on computer systems now have the potential to cause global catastrophe, but only in combination with another disaster, the Organisation for Economic Cooperation and Development (OECD) said in a report on Monday. The study, part of a wider OECD project examining possible "Future Global Shocks" such as a failure of the world's financial system or a large-scale pandemic, said there were very few single "cyber events" that could cause a global shock. Examples were a successful attack on one of the technical protocols on which the Internet depends, or a large solar flare that wiped out key communications components such as satellites. But it said a combination of events such as coordinated cyber attacks, or a cyber incident occurring during another form of disaster, should be a serious concern for policy makers. "In that eventuality, 'perfect storm' conditions could exist," said the report, written by Professor Peter Sommer of the London Sch...
FBI to press criminal charges over AT&T iPad user data hack !

FBI to press criminal charges over AT&T iPad user data hack !

Jan 18, 2011
Remember last summer when iPad users on the AT&T network in the US were subject to a hack that allegedly saw around 120,000 customers personal details compromised? The FBI certainly remembers and today it is set to reveal details criminal charges relating to the case, according to Reuters. As we reported at the time, hackers seemingly obtained access to the database of 3G iPad owners and their email addresses. The data was obtained by executing a brute force attack on the AT&T website. AT&T offered a convenient way of letting users log into their 3G data plan accounts, auto-populating users email address on the dashboard by referencing the unique identifier (ICC-ID) of the users iPad. AT&T allowed log into their 3G data plan accounts, auto-populating their email addresses on the dashboard by referencing the unique identifier (ICC-ID) of their iPad. It appeared at the time that the hackers produced a script that auto-generated thousands of unique ICC-IDs, harvesting...
11 Websites hacked by team Jmc H4x0rs !

11 Websites hacked by team Jmc H4x0rs !

Jan 18, 2011
11 Websites hacked by team Jmc H4x0rs ! Hacked Sites : http://tronix.se/ oscommerce2st/catalog/images/ jmcc.html http://www.colecionismo.com. br/loja/images/jmcc.html http://danawa.jp/images/jmcc. html http://www.solarinformatica. com.ar/catalog/images/jmcc. html http://www.boutiquespk.ca/ images/jmcc.html http://www.matech.pl/sklep/ images/jmcc.html http://www.steinkartei.de/ images/jmcc.html http://toy.lt/images/jmcc.html http://www.hiphopdt.de/shop2/ images/jmcc.html http://www.eshoping.lt/ hobbystore/images/jmcc.html http://shop.aplusmoto.ch/ catalog/images/jmcc.html News Source : Jmc H4x0rs | Via Email 
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
Hacking kits making Cyber Crime Easy !

Hacking kits making Cyber Crime Easy !

Jan 18, 2011
The incidence of cybercrime is set to increase with the proliferation of pre-made hacking software able to be used by less sophisticated criminals, research suggests. IT security software maker Symantec said attack toolkits are becoming more accessible and easier to use, allowing criminals with little technical expertise to turn to cybercrime. The kits can facilitate widespread attacks on computer networks, enabling the launch of pre-written threats, but with certain customised characteristics. Advertisement: Story continues below "In the past, hackers had to create their own threats from scratch," Symantec Australia and New Zealand managing director Craig Scroggie said. This limited the number of hackers, but toolkits are now enabling more people to be involved in cybercrime. A cybercriminal ring was busted late last year over the theft of over $70 million from online banking and trading accounts, allegedly using a kit known as Zeus, Symantec said. "The simplicity, acc...
Phone Creeper v0.98 latest version download !

Phone Creeper v0.98 latest version download !

Jan 18, 2011
“ Phone Creeper is a phone espionage suite It can be silently installed by just inserting an sd card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controled by sms text messages. All commands will be silently received and deleted immediately and results will be issued back to sender.  Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default, this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device . ” This is the change log: GETPOS command for GPS location now just grab and sends on demand to minimize battery & CPU usage Block list will now also block SMS messages from users in list also, not just calls. Emergency contact and SIM detection features fixed up. GPS google map...
Maltego v3.0.3 - Latest version Download !

Maltego v3.0.3 - Latest version Download !

Jan 18, 2011
“Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure. Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format” This release offers a fantastic amount of stability and most importantly speed to Maltego. This release also has an updated user guide! Download Maltego v3.0.3  here
Best 5 Cookie Managers tools download !

Best 5 Cookie Managers tools download !

Jan 18, 2011
Free the Top 5 Cookie Managers are , We hope iif you have any other free better known Cookie Managers help us contribute to the list. 1) Cookienator 2.5.32 Cookienator is a tool that will help you remain anonymous from search engines such as Google and other notorious web-usage trackers such as Doubleclick or Omniture. Many websites install cookies in your browser, and these little bits of tracking data will be used to identify you for as long as you keep using your computer. In the past few years I have been alternating between religiously clearing my cookies from time to time, or neglecting to do so with hope that these corporations will live up to their vague promises of doing no evil. Then I decided that it’d be more productive to automate the whole thing, so I spent a good chunk of a weekend creating the first version of Cookienator, a simple program that will leave most of your cookies alone but will remove the ones that put your privacy at risk. It lets users delete evi...
aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

aidSQL: A Tool to Find Vulnerable Spots in Web Sites !

Jan 18, 2011
aidSQL is a PHP application provided for detecting security holes in your websites. It is a modular application, meaning that you can develop your very own plugins for SQL injection detection & exploitation. Sample usage of aidsql: ./aidSQL --url=www.sample123.com We find it similar to nikto, whatweb and others. One good feature is that we can get a reverse basic shell once exploited. It also has a simple shell script which will run aidSQL and do some checking for PHP. You can also Google through this application and look up for sites. It also includes a primitive crawler. Download aidsql (aidsql-devel-01102011.tgz) here News Source : Google
Rapper Lil Wayne's Twitter account hacked !!

Rapper Lil Wayne's Twitter account hacked !!

Jan 18, 2011
Rapper Lil Wayne has become the latest victim of web hackers when his Twitter account was compromised by an internet prankster. The 28-year-old hip hop star has suspended his Twitter account after the hacker sent a number of objectionable messages to his fans and followers, reported Contactmusic. The 'Lollipop' hitmaker's page was illegally accessed on January 16 and rude messages were sent to his celebrity pals which included 50 Cent, Soulja Boy and The Game. The hacker also posted explicit jibes about the rapper's recent spell in prison on weapons possession charges. One of the post sent to Soulja Boy reads, "I sent a donations (sic) to your Paypal, check it, I heard you got 13,000 (record) sales lil homie, I feel bad for you!" Wayne's page was also hacked last year where the prankster posted fake news of the rapper performing with Nicki Minaj. His account has now been taken offline. News Source : Times of India
Expert Insights Articles Videos
Cybersecurity Resources