#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

No, you can't see who viewed you on Facebook !!

No, you can't see who viewed you on Facebook !!

Dec 03, 2010
Let's put this matter to rest right now: Any Facebook application that offers to reveal who is viewing your profile is a scam. Period. Security research firm Sophos posted a memo about a rogue app that was spread on Facebook recently with messages like " OMG ... I can't believe this actually works! Now you really can see who viewed your profile! " The app is bogus. I've asked a Facebook representative about this before, and he told me that apps on the site do not have the ability to track who is viewing profiles. In this particular case, clicking on the link provided in the message takes users to a Web page that encourages people to permit an application to access their Facebook profile. "But do you really want complete strangers to be able to e-mail you, access your personal data, and even post messages to any Facebook pages you may administer?" the Sophos post asks. Nearly 60,000 people have fallen for the latest scam, based on figu
Oh Shit ! Stuxnet code being sold on black market

Oh Shit ! Stuxnet code being sold on black market

Dec 02, 2010
According to a report from Sky News, the Stuxnet worm has already been traded on the black market. The report does not clarify whether this refers to the source code or to binary samples. British security specialists now fear that terrorists could use the worm to attack critical infrastructure. The report quotes an IT security consultant to the UK government as claiming, "You could shut down power stations, you could shut down the transport network across the United Kingdom". According to the report, there is hard evidence that Stuxnet is in the hands of highly motivated, well trained, well financed criminals. Sky News' source declined to give more precise information. Audun Lødemel, VP of Marketing and Business Development at German IT service provider Norman, believes that, "It was just a matter of time before the Stuxnet code was made available for anyone, with even the most basic knowledge of coding, to alter and potentially wreak havoc on the UK infrastructure.
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
Missouri university : Former students charged for hacking !

Missouri university : Former students charged for hacking !

Dec 02, 2010
Two former University of Central Missouri students have been charged with hacking university databases, stealing and trying to profit from the sale of confidential information. Joseph Camp and Daniel Fowler were both indicted by a federal grand jury. The pair allegedly developed a computer virus and distributed it through email attachments and USB flash drives. In all, they breached the personal data of about 90,000 UCM students, faculty, staff and alumni. Camp and Fowler then tried to sell the information for $35,000. The seven-count indictment also charges them with trying to steal university funds and using Facebook accounts to threaten potential witnesses. The charges carry possible prison sentences of between two and 10 years. "The duo used Fowler's room as their base and over a three-month period between October and December 2009 broke into numerous university databases and computers - including one belonging to a university administrator," acc
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
Hacker blackmailed women into making porn movie !!

Hacker blackmailed women into making porn movie !!

Dec 02, 2010
A CALIFORNIA man has been charged after he allegedly hacked into more than 100 computers to look for sexually explicit photos that he then used to blackmail his victims into handing over homemade sex tapes. Luis Mijangos, 31, was charged with extortion after he allegedly infected more than 100 computers with a virus disguised as a popular song download, which allowed him to take over the personal computers used by about 230 people, including 44 children, myFOXla.com reports . US Attorney's Office spokesman Thom Mrozek said Mr Mijangos looked for sexually explicit photos of the computer users, then threatened to email the files to everyone on the victims' mailing lists if they did not make homemade pornography for him. The Santa Ana man was also accused hacking into email and social networking sites so he could pose as the boyfriend of unsuspecting women and teenage girls — and ask them to make sex videos. After getting the videos, he would then
Computer bank account hacker Anthony Scott Harrison 'no serious criminal' !!

Computer bank account hacker Anthony Scott Harrison 'no serious criminal' !!

Dec 02, 2010
A COMPUTER hacker who infected more than 2300 computers with a virus capable of stealing banking details did not have serious criminal intentions, a court has heard. Today, lawyers for Anthony Scott Harrison told the District Court his " youthful curiosity " had led him into hacking into the computers of others to steal money. " Using the Google search engine he learnt all he could about hacking ," Harrison's lawyer, John Edwards, said. "He did not start hacking with serious criminal intentions ... because he was unemployed he then utilised his hacking skills to provide money. " Underlying his initial attraction to hacking was not theft or greed, but was youthful curiosity ." Harrison, 21, of Blackforest, has pleaded guilty to one count of modifying computer data to cause harm or inconvenience, two counts of possession or control of data to commit serious computer offences and one count of dishonestly manipulating
Breaking News : Adelaide hacker infected 2000 computers !

Breaking News : Adelaide hacker infected 2000 computers !

Dec 02, 2010
AN Adelaide computer hacker infected more than two thousand computers in Australia and overseas with a program to capture banking details, a court has heard. Anthony Scott Harrison, 20, used the internet to teach himself the necessary hacking and programming skills to launch his attack in 2009 but was caught when suspicious web activity was spotted and tracked by federal police. He also modified and sold software to allow others to infect computers, with his offending flowing from his obsession with the world of cyber fantasy. Harrison pleaded guilty to seven charges including four counts of modifying computer data to cause harm. Defence counsel John Edwards told the South Australian District Court today that from the age of 14 his client had become obsessed with playing online computer games and had become " immersed in the world of cyber fantasy ". At one stage he was playing online for up to 15 hours a day, often using a simulated hacking
Cybersecurity Resources