#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

China said that needs 'more Internet security' !

China said that needs 'more Internet security' !

Dec 29, 2011
China should invest more in its own Internet security, lest it become a victim, or even scapegoat, for international hacking activities, an industry expert said on Tuesday. " Our current protection input is not enough, and the scale and size is far less intensive compared to that of Europe and the United States, " Su Hao, an expert on international security at the China Foreign Affairs University, told  China Daily . Su was referring to a recent news source in Germany, which again singled out China for suspicion of cyber attacks. The report said Germany in 2010 detected a sharp rise in hacking activities - a large number of which it claimed may have been from China. "There has been a sharp rise in so-called electronic attacks on the networks of German government and local authorities," Interior Ministry spokesman Stefan Paris told a regular government briefing. Paris was quoted by the AFP as saying that "China is playing a large role in this". The report i
Abuse of social networking sites misused among youth in Kochi !

Abuse of social networking sites misused among youth in Kochi !

Dec 29, 2011
while engaging in online social networking sites seemed to have yielded little results, if the statistics and current trends are any indication. The Cyber Cell of the City Police has received more than 40 complaints of abuse of social networking sites like Orkut and Facebook this year itself. In one such case reported last month, a student union leader of a leading college in the city complained of someone making a fake profile of his on Facebook and inviting friends. The fake identity was circulated among the original friend list, along with the message that the original identity has been hacked. The complainant lodged the petition when the suspect also started making pestering calls to his mobile phone and threatened to make complicate things if any attempt was made to stop him. The suspect was tracked to Saudi Arabia, where he was operating a 'rent-a-car' service. Since none of the immediate relatives of the suspect were available at the home address at Thalassery, the police c
GenAI: A New Headache for SaaS Security Teams

GenAI: A New Headache for SaaS Security Teams

Apr 17, 2024SaaS Security / AI Governance
The introduction of Open AI's ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS vendors are now rushing to upgrade tools with enhanced productivity capabilities that are driven by generative AI. Among a wide range of uses, GenAI tools make it easier for developers to build software, assist sales teams in mundane email writing, help marketers produce unique content at low cost, and enable teams and creatives to brainstorm new ideas.  Recent significant GenAI product launches include Microsoft 365 Copilot, GitHub Copilot, and Salesforce Einstein GPT. Notably, these GenAI tools from leading SaaS providers are paid enhancements, a clear sign that no SaaS provider will want to miss out on cashing in on the GenAI transformation. Google will soon launch its SGE "Search Generative Experience" platform for premium AI-generated summaries rather than a list of websites.  At this pace, it's just a matter of a short time befo
CERT-In to assist Kerala to beef up Cyber Security

CERT-In to assist Kerala to beef up Cyber Security

Dec 29, 2011
Recently a spate of defacements has been reported from websites pertaining to Kerala. As per the statistics available with the Computer Emergency Response Team Kerala (CERT-K), as many as 40 odd websites from Kerala were hacked in the last six weeks. Random messages on social networking sites hint at the possibility of further attacks by December 31, 2010. Realising the need to strengthen security incident response as well as to take proper proactive steps, the Indian Computer Emergency Response Team (CERT-In) will be sending three of their experts to Kerala to share their knowledge and experience with the officials here to ensure cyber safety and security. Accordingly, CERT-K in association with the Kerala State IT Mission (KSITM) is organising a workshop on 'Security Incident Response' on December 29 for System Developers and Administrators of various Government Departments at the Institute of Management in Government (IMG) in Trivandrum. Hacking Methodology and Detection of attacks
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Adaptive Security Analyzer IIS : A Tool to Protect Windows Based Web Servers !

Adaptive Security Analyzer IIS : A Tool to Protect Windows Based Web Servers !

Dec 29, 2011
Adaptive Security Analyzer IIS or the ASA IIS protects Windows-based web servers from known and unknown vulnerabilities like Directory Traversal, Buffer Overflow, Parser Evasion, High-bit Shellcode, Remote Data Services , In addition to the above, it also protects them from various types of internal system misuse. ASA IIS is comprised of two key components. The first is implemented as an ISAPI filter which collects and feeds data to the Adaptive Security Engine (ASE) . Leveraging a breakthrough combination of applied mathematic and cybernetic approaches that enable machine learning and analysis of the network security information, ASE continuously monitors the vital aspects of IIS operation. ASE detects abnormal requests and other unusual traffic enabling ASA IIS to prevent any type of activity which could be harmful to the network . We are also testing this tool in our test environment . We think that it will be very useful for small organizations to be pr
Report : Top Hacker Targets Include Mobile Devices and Mac !

Report : Top Hacker Targets Include Mobile Devices and Mac !

Dec 29, 2011
McAfee is making security predictions for 2011. The firm outlines its top threats for next year in the 2011 Threat Predictions report -- and Android, iPhone, Foursquare, Google TV, and Mac OS X are listed as major cybercrime targets. Politically motivated attacks are also expected to increase, a la WikiLeaks. "We've seen significant advancements in device and social-network adoption, placing a bullseye on the platforms and services users are embracing the most," said Vincent Weafer, senior vice president of McAfee Labs. "These platforms and services have become very popular in a short amount of time, and we're already seeing a significant increase in vulnerabilities, attacks and data loss." Social-Media Threats Social-media threats are nothing new, but expect to see more of them next year. McAfee Labs expects social-media services that use URL shortening will be under attack because its easier for cybercriminals to mask the full URL and direct users to m
Cyprus police said, Turk hackers avenge basketball riot !

Cyprus police said, Turk hackers avenge basketball riot !

Dec 29, 2011
Turkish computer hackers targeted around 20 websites in Cyprus over the weekend in retaliation for an attack on a Turkish basketball team by Greek Cypriot fans, a police spokesman said on Monday. " Acting on information from the office for combating cyber-crime, it was observed that around 20 company websites hosted within the Cyprus Republic were illegally accessed by Turkish hackers, " said Michalis Katsounotos. On some website homepages, the hackers inserted the emblem of basketball team Pinar Karsiyaka, the crescent moon of the Turkish flag, or the words " No Terrorism in Sport. " A FIBA basketball cup match on December 21 between hosts APOEL Nicosia and Turkey's Pinar Karsiyaka ended in violence as 500 rock-throwing local fans clashed with police who prevented them from confronting the Karsiyaka players. Tear gas was used to restore order, while police cars ferrying reinforcements to the sports stadium were pelted with stones. Five officers received ho
Cybersecurity Resources