#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

AVG 2011 Software Pack (All-in-one) +keys Download

AVG 2011 Software Pack (All-in-one) +keys Download

Jan 02, 2011
AVG Anti-Virus 2011 11.20 Build 3152 Final (x86/x64) Anti-Virus 2011 New version of famous anti-virus program from Czech developer to protect your PC from dangerous objects and network threats. Program blocks viruses, trojans, worms, spyware, and a module to deal with rootkits helps get rid of the malicious processes, masking the virus. Compatible with Windows Vista and Windows 7 AVG Internet Security 2011 10.0.0.1120a3152 AVG Internet Security 2011 security solution from all types of Internet threats. The program combines all the necessary safety features: antivirus, antispyware, firewall, antispam and other components AVG PC Tuneup 2011 Final 10.0.0.20 You already know how AVG can protect you online. Now we take that expertise one step further by fixing problems that slow you down. AVG PC Tuneup is your one-stop shop to help you get the most out of your PC. Download Links : https://www.fileserve.com/file/XwGMurN https://www.fileserve.com/file/cnDx82Y https://www.fileserve.co
Geinimi Trojan targets Android devices !

Geinimi Trojan targets Android devices !

Jan 02, 2011
A data-stealing Trojan affecting Android devices has emerged in China. The Geinimi Trojan sends location co-ordinates, unique device identifiers, and a list of installed apps on the infected device to a remote server. Additionally, it can independently download applications and prompts the user to install them, mobile security company Lookout said on Wednesday. "Geinimi's author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities," Lookout said in a blog post on Wednesday. "In addition to using an off-the-shelf bytecode obfuscator, significant chunks of command-and-control data are encrypted. While the techniques were easily identified and failed to thwart analysis, they did substantially increase the level of effort required to analyse the malware." When an application containing the Trojan is launched on an Android device, the Trojan will run in the backgro
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Sony PlayStation 3 hacked, PS3 jailbreak Fail0verflow method !

Sony PlayStation 3 hacked, PS3 jailbreak Fail0verflow method !

Jan 01, 2011
Sony PlayStation 3 hacked, PS3 jailbreak Fail0verflow method. Sony PlayStation 3 has successfully been hacked by a team of hackers named fail0verflow thanks to its poor public key cryptography. The hacker group demonstrated their hacking tricks at the Chaos Communication Conference 27C3 in 45 minutes. Hackers stated that they could crack PS3 through its feeble cryptographic implementation. The hacker team discovered several of Sony's security downfalls with its PS3 after their deep research on the system. They said that it was so easy to get into PS3's innards, if intruded through its weak public key cryptography. They worked with an aim to restore PS3's Linux capability. Sony has removed Linux capability of original PS3 and PS3 Slim. In their presentation, at the Chaos Communication Conference, the PS3 hacker team elaborately explained how they managed to hack the gaming device from Sony. They said they have been working through the device's several security levels that conta
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
DDOSIM – Layer 7 DDoS Simulator !

DDOSIM – Layer 7 DDoS Simulator !

Jan 01, 2011
ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, ddosim starts the conversation with the listening application (e.g. HTTP server). ddosim is written in C++ and runs on Linux. Its current functionalities include: HTTP DDoS with valid requests HTTP DDoS with invalid requests (similar to a DC++ attack) SMTP DDoS TCP connection flood on random port In order to simulate such an attack in a lab environment we need to setup a network like this: Download :   ddosim-0.2.tar.gz More Info : 1)   DDOSIM at Sourceforge
The Blackbuntu Community Edition Download !

The Blackbuntu Community Edition Download !

Jan 01, 2011
The Blackbuntu Community Edition is a Linux Live-CD based on Ubuntu 10.10 which was specially designed for security training students and practitioners of information security.  Another tool for penetration testers collection that could be considered as a competition for  Pentoo . It supports the following list penetration testing methodologies: Information Gathering Network Mapping Vulnerability Assessment Privilege Escalation Maintaining Access Intrusion Detection and Prevention Digital Forensics Web Application Analysis Reverse Engineering Wireless Analysis Security Distributions Malicious Code Analysis AntiSpyware & AntiVirus Tools Password Recovery & Managers To be precise, it contains the following tools: Information Gathering : DNS DnsEnum Dnsmap Dnsrecon DnsTracer Dns-Walk Fierce FindDomains HostMap Lynis Email Harvesting theHarvester Routing 0trace Itrace Lanmap2 Nat Probe Netenum Netmask NMBscan Protos Tctrace TCPtraceroute Search
Expert Insights
Cybersecurity Resources