-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Flickr accidentally deletes photos of 3,400 user’s permanently !

Flickr accidentally deletes photos of 3,400 user’s permanently !

Feb 04, 2011
Flickr initially said that it had assuredly deleted Mirco Wilhelm's five-year old account, but a day afterwards said that it has absolutely adequate the photo collection. It’s every Flickr user’s affliction nightmare: one day you login to acquisition your accumulating of bags of anxiously organized photos acquire vanished. Permanently. That’s absolutely what happened this anniversary to Mirco Wilhem. When Wilhelm, a five-year affiliate of the Yahoo-owned photo-sharing website, approved to log in to his annual he was denied admission and instead prompted to actualize a fresh account. An e-mail from Flickr eventually accepted his fears: Hello, Unfortunately, I have mixed up the accounts and accidentally deleted yours. I am terribly sorry for this grave error and hope that this mistake can be reconciled. Here is what I can do from here: I can restore your account, although we will not be able to retrieve your photos. I know that there is a lot of history on your account–again, pl...
Facts : Facebook is more addictive than sex and cigarettes !

Facts : Facebook is more addictive than sex and cigarettes !

Feb 04, 2011
A small study by a trending company shows that Facebook addiction is one of the fastest growing searches related to addiction. It is more popular than searches for sex or cigarette addiction. While we already knew that social networks like Facebook produce drugged-up, sex-crazed teenagers, new research shows that Facebook addiction may be soon be more prevalent than offline addictions like sex. The Internet Time Machine, a company that searches for trends across the Web through its extensive cloud computing network, is reporting that Facebook may be more popular than sex. Addiction to social media, specifically Facebook, is one of the top ranked digital addictions, says the trending company. More people are searching for help with Facebook addiction than sex addiction. “The rise of social media and the fear/need to be in constant contact with status updates and tweets has created a problem for people with addictive personalities,” says ITM. “The fact that accessing Facebook is so...
Local Training Center, Hacker University, 8 in the USA Participate in Global Launch of Certified Ethical Hacker version 7

Local Training Center, Hacker University, 8 in the USA Participate in Global Launch of Certified Ethical Hacker version 7

Feb 04, 2011
450 Global Training Centers Nominated, 25 Selected Worldwide, 8 in the USA, 1 in St. Louis (February 2, 2011) St.  Louis, MO – Hacker University is pleased to announce it has been asked by EC-Council, the leading international certification body in information security, to participate in the Global Launch of CEH v7 - the most advanced information security and ethical hacking training program in the world which is not yet publicly available. Only 15 students will be allowed to attend this exclusive, cutting-edge class the week of March 14, 2011 in St. Louis – becoming one of the world’s first CEH v7 certified professionals. Hacker University’s Global Launch instructor and co-owner, Dave Chronister, is thrilled to be a part of this revolutionary event. “I am excited at the universal recognition this event brings the city of St. Louis as well as Hacker University. CEH version 7 breaks away from its earlier releases with more emphasis on techniques and methodologies hackers use to...
cyber security

5 Cloud Security Risks You Can’t Afford to Ignore

websiteSentinelOneEnterprise Security / Cloud Security
Get expert analysis, attacker insights, and case studies in our 2025 risk report.
cyber security

Red Report 2026: Analysis of 1.1M Malicious Files and 15.5M Actions

websitePicus SecurityAttack Surface / Cloud Security
New research shows 80% of top ATT&CK techniques now target evasion to remain undetected. Get your copy now.
Social gaming Website Zynga Hacked, $12 million worth Poker chips Stolen !

Social gaming Website Zynga Hacked, $12 million worth Poker chips Stolen !

Feb 03, 2011
Apparently, one guy managed to hack into social gaming giant Zynga. It transferred 400 billion (!) Poker chips virtual about him and began to sell on the black market. (Yes, apparently, is there a black market for virtual Zynga Poker Chips.) They were worth about $ 12 million. This is how the man was called and has since pleaded guilty and will probably serve a long prison sentence (he was on parole for a first offense of piracy related). Interestingly, there was a debate in the British court, where he was prosecuted for piracy, which is really the flight because of poker chips are good virtual, virtual, and Zynga can create as many as he wants. The Court responded by saying that yes, virtual goods are treated as property and add chips to your account amounts to theft. What we want to know is how the guy managed to hack Zynga, and what they do to ensure it does not recur. We asked for details Zynga and will keep you updated if we learn more. We just ask rogue hackers do not disru...
Google bets $20000 that Chrome browser can not be hacked !

Google bets $20000 that Chrome browser can not be hacked !

Feb 03, 2011
Google will pay $ 20,000 for the first scientist who succeeds in its Chrome browser to exploit this year's competition Pwn2Own piracy. The price is the largest ever to face the annual challenge, which begins for the fifth time in the CanSecWest security conference in Vancouver, British Columbia, March 9. In Pwn2Own this year, researchers sky exploits against machines running Windows 7 or Mac OS X, as they try to download Microsoft Internet Explorer, Mozilla Firefox, Apple Safari and Chrome. The researchers first to hack IE, Firefox and Safari will receive $ 15,000 and the computer running the browser. Prices are $ 5,000 higher than those given for the use of browsers in the last contest Pwn2Own, and three times the 2009 price. "We've raised the bar this time and the total allocated to cash prices rose to a whopping $ 125,000," said Aaron Portnoy, director of HP TippingPoint Security Research Team. TippingPoint, which is once again sponsoring Pwn2Own, set th...
Uttar Pradesh ATS To Investigate The Hacking of Gramin Bank Website !

Uttar Pradesh ATS To Investigate The Hacking of Gramin Bank Website !

Feb 03, 2011
Uttar Pradesh Anti Terrorist Squad will investigate piracy Ballia-Etawah Gramin Bank site would have been committed by a Pakistani organization, a police official said today. The survey was delivered to the ATS unit Varanasi as it was a case of cyber crime and there is a suspicion on the involvement of hackers based in Pakistan, said district SP Ram Swaroop here. A message was posted to the website of the bank for a night of self-proclaimed Pakistan. "The bank's site has been hacked ... This is just a trailor ... I'll show you a perfect film," the website message-balls Etawah graminea Bank said, according to police. . "We Luv break the tight security, therefore, the hackers were invited to the Indians ... my next bank target sites if you can not store Gud Luck -.. cyber barrier of Pakistan," the message said. anonymous caller informed the Director-General and banking graminea, Anil Prakash on the message on its website.
WikiLeaks nominated for Nobel Peace Prize,Truth is the most powerful weapon against Injustice ! !

WikiLeaks nominated for Nobel Peace Prize,Truth is the most powerful weapon against Injustice ! !

Feb 03, 2011
A Norwegian politician said he called Wikileaks for the Nobel Peace, referring to the site's contribution to "democracy and freedom" around the world. Nominations for the price of peace is closed Tuesdays. Any beneficiary legislator, academic or award in the world can nominate anyone for the price, according to the website of the Prize. Storting parliament Snorre Valen Wikileaks said on condition that contributed to "draw a map of the freedom of information." "Xiabao Liu was awarded the Nobel Peace Prize last year, fought for human rights, democracy and freedom of expression in China," Valen wrote on his blog. "Similarly, Wikileaks took part in the battle those same values throughout the world, exposing (among many other things), corruption, war crimes and torture." Wikileaks is a site that publishes documents concerning its business and neglect of the government. Critics have accused of endangering national security, while the defen...
Hackers Shut Down Egyptian Government Sites !

Hackers Shut Down Egyptian Government Sites !

Feb 03, 2011
The online accumulation Anonymous said Wednesday that it had bedridden the Egyptian government’s Web sites in abutment of the antigovernment protests. Anonymous, a about authentic accumulation of hackers from all over the world, aggregate about 500 supporters in online forums and acclimatedcomputer application accoutrement to accompany bottomward the sites of the Ministry of Information and President Hosni Mubarak’s National Democratic Party, said Gregg Housh, a affiliate of the accumulation who disavows any actionable action himself. The sites were bare Wednesday afternoon. The attacks, Mr. Housh said, are allotment of a added attack that Anonymous has army in abutment of the antigovernment protests that accept confused the Arab world. Aftermost month, the accumulation shut bottomward the Web sites of the Tunisian government and banal barter in abutment of the insurgence that affected the country’s dictator, Zine el-Abidine Ben Ali, to flee. Mr. Housh said that the accumulation ...
Bing caught copying search results from Google !

Bing caught copying search results from Google !

Feb 02, 2011
In a case of Internet espionage that makes the antics of double agent Cold War operatives seem like frivolous child play, Bing has been caught stealing search results from Google with its Bing toolbar and IE8's Suggested Sites feature. Google first suspected foul play in May 2010. By October 2010, with Bing results beginning to look uncannily like Google's, it knew something had to be done about it -- and so, in true, nerdtastic style, Google set up a sting to prove that Microsoft was actually behind the wholesale mimicry of Google's search results.   One of Google's 'sting' queries A few days later, the same result on Bing Google injected "synthetic" results into its search engine -- fake queries and results that no real user or engine would ever generate. Then, on D-Day, December 17, about 20 Google engineers were asked to run the test queries with Internet Explorer 8, Bing Bar and Suggested Sites. By December 31, some of these fake results beg...
Expert Insights Articles Videos
Cybersecurity Resources