#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Search results for LT Security | Breaking Cybersecurity News | The Hacker News

Israeli Road Control System hacked, caused Traffic jam on Haifa Highway

Israeli Road Control System hacked, caused Traffic jam on Haifa Highway

Oct 28, 2013
Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on his technology. Yesterday, Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa suffered a cyber attack, that caused massive traffic congestion in the City. Isreal military officials are aware of cyber threats that could hit the infrastructure of the country and they afraid the possible effect of a cyber attack on a large scale. Israeli government websites suffer thousands of cyberattacks each day according Ofir Ben Avi, head of the government's website division. The Israel Electric Corp. confirmed that its servers register about 6,000 unique computer attacks every second. In June, Prime Minister Benjamin Netanyahu stated that Iran militia, Hezbollah and Hamas have targeted in numerous occasions Israel...
How to Hack WiFi Password Easily Using New Attack On WPA/WPA2

How to Hack WiFi Password Easily Using New Attack On WPA/WPA2

Nov 25, 2018
Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers. Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features enabled. The attack to compromise the WPA/WPA2 enabled WiFi networks was accidentally discovered by Steube while he was analyzing the newly-launched WPA3 security standard . This new WiFi hacking method could potentially allow attackers to recover the Pre-shared Key (PSK) login passwords, allowing them to hack into your Wi-Fi network and eavesdrop on the Internet communications. How to Hack WiFi Password Using PMKID According to the researcher, the previously known WiFi hacking methods require attackers to wai...
Thurston sees largest identity theft case in the county's history !!

Thurston sees largest identity theft case in the county's history !!

Jan 10, 2011
An Olympia-area man has been arrested in what the Thurston County Sheriff's Office says is the largest identity-theft case in the county's history. More than 1,000 victims statewide had their driver's licenses, credit cards and Social Security numbers stolen, according to the Sheriff's Office. Detectives served a search warrant at a Johnson Point Road home Thursday morning and arrested Anthony Eugene Vaughn, 30, on suspicion of 1,000 counts of second-degree identity theft and two counts of first-degree identity theft. During a hearing Friday, Thurston County Superior Court Judge Lisa Sutton ordered Vaughn held at the Thurston County Jail with bail set at $500,000. The case remained under investigation, and more arrests might be coming, sheriff's Sgt. Jim Dunn said Friday. Detectives think Vaughn had accomplices who stole identification documents during car prowls and residential burglaries and that he used the documents to open fraudulent bank accounts in the victims' names. He t...
cyber security

Secured Images 101

websiteWizDevOps / AppSec
Secure your container ecosystem with this easy-to-read digital poster that breaks down everything you need to know about container image security. Perfect for engineering, platform, DevOps, AppSec, and cloud security teams.
cyber security

When Zoom Phishes You: Unmasking a Novel TOAD Attack Hidden in Legitimate Infrastructure

websiteProphet SecurityArtificial Intelligence / SOC
Prophet AI uncovers a Telephone-Oriented Attack Delivery (TOAD) campaign weaponizing Zoom's own authentication infrastructure.
Law Enforcement Officers Witness Cyber Theft Demonstration at UNLV Conference

Law Enforcement Officers Witness Cyber Theft Demonstration at UNLV Conference

Dec 21, 2010
Nearly 100 law enforcement officers recently witnessed how easily an identity thief can steal electronic information. During a UNLV conference, a cybercrime expert used a $30 device to intercept data from their smartphones. Welcome to the dark side of the 21st century. As technology advances, so do the methods of thieves. They now target computers, phones, ATMs, credit card machines, and any device holding personal information. Identity theft is a severe crime. Criminals can quickly wreak havoc by draining bank accounts, taking out loans, and racking up credit card debts. A victim's credit score can be ruined in no time. As reported by Steve Kanigher in the Las Vegas Sun, Nevada has been a hotspot for identity theft. According to the Federal Trade Commission, Nevada ranked fifth in the nation for identity theft last year. This is an improvement from 2005 when it was second. Metro Police reported 2,063 cases from January to November 13 this year, down from 2,440 during the same...
Snowden used web crawler tool to access and download 1.7 million Secret NSA Files

Snowden used web crawler tool to access and download 1.7 million Secret NSA Files

Feb 10, 2014
National Security Agency (NSA) – the one that had ruled over the privacy of the entire world from countries to individuals, the one with master access to read anyone's data, intruded into large fiber networks, and can target anyone, at any time, at any place; but lapsed somewhere in protecting its own privacy and security of the confidential data. If I am wrong, then from where did Snowden gets hold over roughly 1.7 million NSA's confidential files in sequence? According to the Intelligence officials who has investigated the insider theft by Snowden, noticed that he had accessed all these documents using some ' web crawler ', a freely available automated tool also known as spiders, which used to search, index and backup a website, " scraped data out of our systems " he said. " We do not believe this was an individual sitting at a machine and downloading this much material in sequence ," he added. He used the web crawler tool against NSA 's internal network and 'probably...
Sony Reply to Congress : We Still Don't Know Who Hacked Us !

Sony Reply to Congress : We Still Don't Know Who Hacked Us !

May 28, 2011
Sony Reply to Congress : We Still Don't Know Who Hacked Us ! Updates from the latest answers submitted by PlayStation executive Kaz Hirai , responding to the House Energy and Commerce Committee's subcommittee on Commerce, Manufacturing, and Trade . Hirai and this subcommittee last discussed PSN through letter writing in early May, not long after the attack took place, PSN went down, accounts were exposed and Congress started questioning. The letter is addressed for yesterday, May 26. " I would like to take this opportunity to express my sincere gratitude to the committee for its appreciation of the gravity of the situation that Sony faced and, accordingly, allowing Sony to defer an appearance before the Committee ," said Hirai. " Sony was unable to appear before the Committee due to exigent circumstancesSony was under attack and it was critically important that our key personnel remain available and ready to address critical issues as our network and game serv...
Expert Insights Articles Videos
Cybersecurity Resources