-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

BlackBuntu V0.3 Released

BlackBuntu V0.3 Released

Aug 05, 2011
BlackBuntu V0.3 Released For Blackbuntu 0.3 we are supporting both x86 and x86_64 architectures.Security and Penetration Testing tools available in Blackbuntu : Information Gathering Network Mapping Vulnerability Identification Penetration Privilege Escalation Maintaining Access Radio Network Analysis VoIP Analysis Digital Forensic Reverse Engineering Miscellanious You can download the Blackbuntu Community Edition 0.3 ISO DVD with the following link: ISO Image(Torrent) Blackbuntu Community Edition 0.3 x86 torrent Blackbuntu Community Edition 0.3 x86_64 torrent VMWARE (Torrent) Blackbuntu Community Edition 0.3 x86 torrent Blackbuntu Community Edition 0.3 x86_64 torrent Virtual Box Image(Torrent) Blackbuntu Community Edition 0.3 x86 torrent Blackbuntu Community Edition 0.3 x86_64 torrent
Customs Authority of Yemen hacked for Protest against Government

Customs Authority of Yemen hacked for Protest against Government

Aug 05, 2011
Customs Authority of Yemen hacked for Protest against Government  Today a Yemen Hacker " Alexploiter " Deface the Website of Customs Authority of Yemen , to show his Protest against Government. Hacker claim that" Well this week i hacked .gov.ye (Yemens govs sites) for now i am controlling the DB of the customs authority of Yemen and there is many more .gov.ye going down soon , reason is that the situation in Yemen now getting worse and worse , and we cant keep watching our bad gov killing the the people in theremore .gov.ye site is going down soon ".
#Blackhat Conference : Square Mobile Gadget allows to Hack Credit Cards

#Blackhat Conference : Square Mobile Gadget allows to Hack Credit Cards

Aug 05, 2011
#Blackhat Conference : Square Mobile Gadget allows to Hack Credit Cards Researchers at the Black Hat security conference today revealed two ways the Square payment system , which turns any iPhone, iPad or Android into a point-of-sale credit card processor, could be used for fraud.  Square a mobile gadget that enables Android, iPhone, iPad, and iPod touch users to accept credit card payments  can be hacked to steal credit card data, with very little technical hardware required. Adam Laurie and Zac Franken, directors of Aperture Labs, discovered that due to a lack of encryption in the current Square app and free dongle for swiping cards, the mobile payment system can be used to steal credit card information, without even having the physical credit card.Square works by converting credit card data into an audio file that is then transmitted to the credit card issuer for authorization. "The dongle is a skimmer. It turns any iPhone into a skimmer," Laurie said. To clone a ca...
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
c0c0n 2011 (Hacking and Security Conference) - Call for Papers

c0c0n 2011 (Hacking and Security Conference) - Call for Papers

Aug 05, 2011
c0c0n 2011 (Hacking and Security Conference) - Call for Papers Announcing c0c0n 2011 - Oct 7-8 Cochin , India c0c0n is an annual event conducted as part of the International Information Security Day. The Information Security Research Association along with Matriux Security Community is organizing a two day International Security and Hacking Conference titled c0c0n 2011, as part of Information Security Day 2011. Various technical, non-technical, legal and community events are organized as part of the program. c0c0n 2011 is scheduled on 07 and 08 Oct 2011.The number of digital security incidents and cyber crimes are increasing daily on a proportionate rate. The industry is demanding more and more security professionals and controls to curb this never ending threat to information systems. c0c0n is aimed at providing a platform to discuss, showcase, educate, understand and spread awareness on the latest trends in information, cyber and hi-tech crimes. It also aims to provide a hand-s...
Get Ready for Microsoft 13 updates for August Patch Tuesday

Get Ready for Microsoft 13 updates for August Patch Tuesday

Aug 05, 2011
Get Ready for Microsoft 13 updates for August Patch Tuesday Microsoft has announced that it will release 13 bulletins to address 22 vulnerabilities in Windows, Office, Internet Explorer, .NET and Visual Studio on its next Patch Tuesday. Another "critical" bulletin affects Windows server operating systems, and addresses a code-execution risk on unpatched systems. Also of note is an update restricted to newer versions of Windows (Windows 7 and Windows 2008) that tackles a potential, though difficult to exploit, code-execution risk. Scheduled for release next Tuesday 9th August. Wolfgang Kandek, CTO of Qualys, commented that the update will have patches for end-users, server administrators, office users and software developers. He said: “ Top priority should be given to a critical bulletin that affects Internet Explorer 6 through 9 on Windows 7, XP, Vista, 2003 and 2008. If left unpatched, attackers could use this vulnerability to remotely take control of victims' sys...
BackBox - Linux distribution based website Hacked

BackBox - Linux distribution based website Hacked

Aug 04, 2011
BackBox - Linux distribution based website Hacked BackBox is a Linux distribution based on Ubuntu Lucid 10.04 LTS developed to perform penetration tests and security assessments. Designed to be fast, easy to use and to provide a minimal yet complete desktop environment thanks to its own software repositories always been updated to the last stable version of the most known and used ethical hacking tools. Two Days back backbox linux website got hacked by Emperor Hacking Team and 3 subdomains named ' Forum.backbox.org ' & ' wiki.backbox.org ' & ' rafaelle.backbox.org ' also got defaced. mirror link1:  http://zone-h.org/mirror/id/ 14521377   www.backbox.org mirror link2:  http://zone-h.org/mirror/id/ 14521376 forum.backbox.org mirror link3:  http://zone-h.org/mirror/id/ 14521386 raffaele.backbox.org
Mini PHP Shell 27.9 V2 Released

Mini PHP Shell 27.9 V2 Released

Aug 04, 2011
Mini PHP Shell 27.9 V2 Released According to Developer jos_ali_joe and [ Devilzc0de ] " This is a continuation of PHP Shell Mini 27.9 V1 , Editing Shell c99 and new tools ". Features :  Encoder , Processes , FTP-Brute-Forcer , Server-Information , SQL-Manager and etc. Download :  http://www.megaupload.com/?d=DRHS3AV9 Disclaimer : Use at your own Risk, Shell may have Backdoor.
The Social-Engineer Toolkit v2.0 Released

The Social-Engineer Toolkit v2.0 Released

Aug 04, 2011
The Social-Engineer Toolkit v2.0 Released The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed. This is the official change log: Removed un-needed assignment in core around create random string Added the Binary2Teensy option in the Teensy menu, this will allow you to create a payload and inject alphanumeric shellcode through shellcodeexec in a new technique released at BSIDESLV Changed the path of metasploit to be /opt/msf3/framework3 versus /pentest/exploits/framework3 Added the ability for multiple payloads in binary2teensy attack Added the ability to leverage the SDCard mounted Teensy device with payload generation without mounting the SDCard to the victim machine Fixed a bug where webattack_email turned on would not trigger base...
GFI SandBox - Powerful automated malware analysis

GFI SandBox - Powerful automated malware analysis

Aug 04, 2011
GFI SandBox - Powerful automated malware analysis GFI SandBox™ (formerly CWSandbox) is an industry leading dynamic malware analysis tool. It gives you the power to analyze virtually any Windows application or file including infected: Office documents, PDFs, malicious URLs, Flash ads and custom applications.Targeted attacks, hacked websites, malicious Office documents, infected email attachments and social engineering are all part of the Internet threat landscape today. Only GFI SandBox™ gives you a complete view of every aspect and element of a threat, from infection vector to payload execution. And GFI SandBox can quickly and intelligently identify malicious behavior using Digital Behavior Traits™ technology. Features Dynamic threat analysis Dynamic and threat analysis shows how applications execute on the desktop, what system changes were made, and the network traffic generated. When coupled with Digital Behavior Traits you get the ability to automatically identify malicious act...
Expert Insights Articles Videos
Cybersecurity Resources