#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

142 Websites Hacked By Tn-V!Rus and salvana !!

142 Websites Hacked By Tn-V!Rus and salvana !!

Dec 31, 2011
142 Websites Hacked By Tn-V!Rus and salvana !! Hacked Websites : https://esmediagroup.co.uk/team.htm https://zionmoto.co.uk/team.htm https://yourdojo.co.uk/www-stats/team.htm https://youngbucks.co.uk/images/team.htm https://xcelconcepts.com/www-stats/team.htm https://windrushedenvillas.com/images/team.htm https://le-tour-new-york.com/team.htm https://le-tour-zurich.com/team.htm https://le-tour-paris.com/team.htm https://le-tour-munich.com/team.htm https://le-tour-dubai.com/team.htm https://le-tour-berlin.com/team.htm https://le-tour-amsterdam.com/team.htm https://le-tour-amsterdam.com/team.htm https://le-tour-berlin.com/team.htm https://le-tour-hamburg.com/team.htm https://le-tour-geneva.com/team.htm https://oxygenleads.com/team.htm https://thefatauntie.com/bank/team.htm https://twilliamsdesign.co.uk/team.htm https://whitehorsescientific.co.uk/team.htm https://www.wilderlogistics.com/team.htm https://www.wilderlogistics.com/team.htm https://vrolok.co.uk/team.htm https://wealthpro
Engineering student arrested in Bhopal for hacking bank accounts !

Engineering student arrested in Bhopal for hacking bank accounts !

Dec 29, 2011
An engineering student has been arrested in Bhopal for hacking third party bank accounts to book railway and air tickets, police said. Sunny Kumar (20), a student of private engineering college, was arrested by Cyber Cell police on Tuesday for hacking third party accounts for transferring cash to book the tickets to those who asked him for them, Inspector General of Police (Cyber Cell), R K Mishra said. As he had no money in his account, Sunny gave heavy discount to his friends and acquaintances to earn money, Mishra said adding he used Internet banking for  committing the crime. However, Sunny generated the tickets in the name of the persons who wanted booking, he said. Action was taken against him after police received complaints from several persons that their bank statements showed money withdrawn for railway and air e-tickets without their knowledge, the IG said. Sunny hails from Bihar and has been living in a rented house, Mishra said. Cyber Cell officials are scanning the bank
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
Millions of customer's email addresses stolen from Honda !

Millions of customer's email addresses stolen from Honda !

Dec 29, 2011
American Honda says it has contacted millions of its customers after hackers stole a database containing names, email addresses, and VINs (the Vehicle Identification Number, or unique 17 character ID for your motor vehicle). The obvious danger is that cybercriminals might use the list to send out emails to Honda customers, designed to trick them into clicking on malicious attachments or links, or fool them into handing over personal information. After all, if the hackers were able to present themselves as Honda, and reassured you that they were genuine by quoting your Vehicle Identification Number, then as a Honda customer you might be very likely to click on a link or open an attachment. For that reason, Honda has contacted all of the 2.2 million customers it believes may have been affected by the security breach. According to a  report by the Columbus Dispatch , the data was stolen from a third-party company who sent out "Welcome" emails to customers who created accounts w
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
China said that needs 'more Internet security' !

China said that needs 'more Internet security' !

Dec 29, 2011
China should invest more in its own Internet security, lest it become a victim, or even scapegoat, for international hacking activities, an industry expert said on Tuesday. " Our current protection input is not enough, and the scale and size is far less intensive compared to that of Europe and the United States, " Su Hao, an expert on international security at the China Foreign Affairs University, told  China Daily . Su was referring to a recent news source in Germany, which again singled out China for suspicion of cyber attacks. The report said Germany in 2010 detected a sharp rise in hacking activities - a large number of which it claimed may have been from China. "There has been a sharp rise in so-called electronic attacks on the networks of German government and local authorities," Interior Ministry spokesman Stefan Paris told a regular government briefing. Paris was quoted by the AFP as saying that "China is playing a large role in this". The report i
Abuse of social networking sites misused among youth in Kochi !

Abuse of social networking sites misused among youth in Kochi !

Dec 29, 2011
while engaging in online social networking sites seemed to have yielded little results, if the statistics and current trends are any indication. The Cyber Cell of the City Police has received more than 40 complaints of abuse of social networking sites like Orkut and Facebook this year itself. In one such case reported last month, a student union leader of a leading college in the city complained of someone making a fake profile of his on Facebook and inviting friends. The fake identity was circulated among the original friend list, along with the message that the original identity has been hacked. The complainant lodged the petition when the suspect also started making pestering calls to his mobile phone and threatened to make complicate things if any attempt was made to stop him. The suspect was tracked to Saudi Arabia, where he was operating a 'rent-a-car' service. Since none of the immediate relatives of the suspect were available at the home address at Thalassery, the police c
CERT-In to assist Kerala to beef up Cyber Security

CERT-In to assist Kerala to beef up Cyber Security

Dec 29, 2011
Recently a spate of defacements has been reported from websites pertaining to Kerala. As per the statistics available with the Computer Emergency Response Team Kerala (CERT-K), as many as 40 odd websites from Kerala were hacked in the last six weeks. Random messages on social networking sites hint at the possibility of further attacks by December 31, 2010. Realising the need to strengthen security incident response as well as to take proper proactive steps, the Indian Computer Emergency Response Team (CERT-In) will be sending three of their experts to Kerala to share their knowledge and experience with the officials here to ensure cyber safety and security. Accordingly, CERT-K in association with the Kerala State IT Mission (KSITM) is organising a workshop on 'Security Incident Response' on December 29 for System Developers and Administrators of various Government Departments at the Institute of Management in Government (IMG) in Trivandrum. Hacking Methodology and Detection of attacks
Adaptive Security Analyzer IIS : A Tool to Protect Windows Based Web Servers !

Adaptive Security Analyzer IIS : A Tool to Protect Windows Based Web Servers !

Dec 29, 2011
Adaptive Security Analyzer IIS or the ASA IIS protects Windows-based web servers from known and unknown vulnerabilities like Directory Traversal, Buffer Overflow, Parser Evasion, High-bit Shellcode, Remote Data Services , In addition to the above, it also protects them from various types of internal system misuse. ASA IIS is comprised of two key components. The first is implemented as an ISAPI filter which collects and feeds data to the Adaptive Security Engine (ASE) . Leveraging a breakthrough combination of applied mathematic and cybernetic approaches that enable machine learning and analysis of the network security information, ASE continuously monitors the vital aspects of IIS operation. ASE detects abnormal requests and other unusual traffic enabling ASA IIS to prevent any type of activity which could be harmful to the network . We are also testing this tool in our test environment . We think that it will be very useful for small organizations to be pr
Report : Top Hacker Targets Include Mobile Devices and Mac !

Report : Top Hacker Targets Include Mobile Devices and Mac !

Dec 29, 2011
McAfee is making security predictions for 2011. The firm outlines its top threats for next year in the 2011 Threat Predictions report -- and Android, iPhone, Foursquare, Google TV, and Mac OS X are listed as major cybercrime targets. Politically motivated attacks are also expected to increase, a la WikiLeaks. "We've seen significant advancements in device and social-network adoption, placing a bullseye on the platforms and services users are embracing the most," said Vincent Weafer, senior vice president of McAfee Labs. "These platforms and services have become very popular in a short amount of time, and we're already seeing a significant increase in vulnerabilities, attacks and data loss." Social-Media Threats Social-media threats are nothing new, but expect to see more of them next year. McAfee Labs expects social-media services that use URL shortening will be under attack because its easier for cybercriminals to mask the full URL and direct users to m
Cyprus police said, Turk hackers avenge basketball riot !

Cyprus police said, Turk hackers avenge basketball riot !

Dec 29, 2011
Turkish computer hackers targeted around 20 websites in Cyprus over the weekend in retaliation for an attack on a Turkish basketball team by Greek Cypriot fans, a police spokesman said on Monday. " Acting on information from the office for combating cyber-crime, it was observed that around 20 company websites hosted within the Cyprus Republic were illegally accessed by Turkish hackers, " said Michalis Katsounotos. On some website homepages, the hackers inserted the emblem of basketball team Pinar Karsiyaka, the crescent moon of the Turkish flag, or the words " No Terrorism in Sport. " A FIBA basketball cup match on December 21 between hosts APOEL Nicosia and Turkey's Pinar Karsiyaka ended in violence as 500 rock-throwing local fans clashed with police who prevented them from confronting the Karsiyaka players. Tear gas was used to restore order, while police cars ferrying reinforcements to the sports stadium were pelted with stones. Five officers received ho
Three cyber crimes a week in Andhra Pradesh this year !

Three cyber crimes a week in Andhra Pradesh this year !

Dec 29, 2011
Andhra Pradesh witnessed three cyber crimes a week on average in 2010 and a majority of them were Nigerian frauds, according to the state crime investigation department. Briefing media on the latest case, Additional SP (cyber crimes) U Ramamohan said this was the 54th case this year registered at the Cyber Crime Police Station here, and that the total number of such cases across the state was over 150. He said this was at least 20 per cent more than such cases last year. In the latest case of Nigerian fraud, a resident of Bhimavaram in West Godavari district was lured into paying Rs 15.88 lakh to claim prize money of 700,000 pounds from a non-existent 'Microsoft lottery.' He was asked on phone to deposit money in two accounts in ICICI Bank and Axis Bank, towards 'RBI clearance', 'anti-terrorism clearance', etc and was even given 'receipts' for the deposits. "These cyber criminals have email IDs of lakhs of people, to which they keep sending mails in batches. Even a very small perce
Cybersecurity Resources