#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

NATO networks vulnerable to cyber threat !

NATO networks vulnerable to cyber threat !

Jan 26, 2011
BRUSSELS (AFP) - NATO's military networks are not fully protected against cyber threats and the alliance must make good on a promise to erect a virtual wall in 2012, a defense official U.S. says Tuesday top. U.S. Deputy Secretary of Defense William Lynn warned after a two-day visit to Brussels that cyber-threats were "mature" from a tool of espionage and disruption to a force cons destructive of critical infrastructure. "I think the discussion about NATO at this time, the step threshold is that we must be able to protect our own military networks, and frankly we're not there yet," Lynn said after meetings with EU and NATO and the private sector. [For complete coverage of politics and policy, go to Yahoo! Politics] Pentagon number two recalled that NATO has made the fight against cyber threats a top priority in November, when NATO leaders agreed Cyber Incident Response Centre at full operational capacity in 2012 three years ahead of schedule . &quo
Google And Mozilla To Make "Do Not Track" Stages !

Google And Mozilla To Make "Do Not Track" Stages !

Jan 26, 2011
SAN FRANCISCO (AFP) - Mozilla and Google, on Monday took steps to give people privacy online, but most everyone said obstacles remain to create simple "Do not follow the software buttons for web browsing . Mozilla has proposed the addition of a signal of its popular Firefox browser that allows users to automatically prompt sites do not monitor their online activities. Web sites then decide whether to grant or desire to continue collecting data for purposes such as targeting Internet advertising. Firefox users would be able to convey what I want to watch a third based on advertising by setting the browsers send a "Do not follow the HTTP header" on each click or page view. "The problem with adding this to the head is that you have both browsers and sites to be implemented to be fully effective," the Mozilla technology and privacy of Alex Fowler, acknowledged in a blog. "Mozilla recognizes the chicken and egg problem, and will propose that this fun
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Spam Search Engine Booming : Google

Spam Search Engine Booming : Google

Jan 26, 2011
If you've noticed lately that Google search results is a bit of spam, you're not alone. In a blog post, Google senior engineer Matt Cutts acknowledged that "we have seen a slight increase in spam in recent months, and the tech pushes critical observers. Cutts then introduced new initiatives to improve the quality of Google search results. Among them: Google has a new "document-level classifier, which detects the best features of spam, such as key words often repeated, and Google is improving its ability to detect the hacked sites, which were a major source of spam last year, and is considering other changes, including a campaign against websites that are mainly copying content from other sites. But the question of "farm content" Cutts does not have all the answers. If you are not familiar with the term, you probably met some sellers of content. For example, many people call the media sites and content companies AssociatedContent Demand Media. A lot of
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
First Cyber police unit launched in Iran !!

First Cyber police unit launched in Iran !!

Jan 26, 2011
TEHRAN - Iran has officially launched on Sunday cyber police unit to tackle crime on the Internet and cons of social networks that spread "espionage and strife," said Police Chief Esmaeil Ahmadi Moghaddam. The first country on the website of the surveillance equipment is in operation in the capital, Tehran, while police stations across the country have their cyber units at the end of Iranian year, March 21, was quoted as saying the state news agency IRNA. Ahmadi Moghaddam said police will counter-revolutionary groups and cyber dissidents who used the Internet, social networks in 2009 to launch protests against the reelection of President Mahmoud Ahmadinejad. "With these social networks in our country, groups of counter-revolutionaries and dissidents be riots and other foreign countries and contact the fire, he said, referring to the anti-Ahmadinejad protests, which led to widespread unrest in Tehran, where tens of people died. Supporters of rival candidates used
Wikileaks said - No, We Do Not Hack The Icelandic Parliament !

Wikileaks said - No, We Do Not Hack The Icelandic Parliament !

Jan 25, 2011
Although some of the United States has accused the Wikileaks to steal data from peer-to-peer file-sharing, the second, was the guest of the payment to the surface in Iceland late last week: that the group informant in some a computer spy planted "in the Parliament building. A brief article in the Icelandic daily Morgunbladid law last Thursday reported that a mysterious PC was found in the Althing, the strengthening of the legislative capital of Reykjavik, in February last year. The team was in an empty room near the office of Birgitta Jonsdottir, a member of parliament who was appointed to the U.S. Department Justice probe of Wikileaks, despite the severance of ties with the group last summer. The newspaper reported that the police investigation has led to suspicions that the equipment was used for espionage, and, although no data or identity of the team gave no clues about its origins, Wikileaks was one of the suspects. Kristinn Icelandic Wikileaks Hrafnson categorically den
PINK's Twitter account Hacked By Husband Carey Hart !

PINK's Twitter account Hacked By Husband Carey Hart !

Jan 25, 2011
This morning, Rosa has been the target of an infamous pirate Twitter - her husband, Carey Hart! After tweeted a video for its nearly three million supporters, she walked away. And then he entered Carey tweeted, "wow, I have the right shit so bad today ... .." Then came the bill, "company .... sorry ..." Later, he realized what he had done, and Twitter that "my man f3cking asshole just raped my Twitter account. I do not write this. My friends suck too much." Then he said: "I go to sleep. Alone. Have fun on the couch monkey butt" after this "Dick Butch Walker @ RT @ pink ehh just do not have to leave the room we have on the computer. Boom!" For fun!
Cybersecurity
Expert Insights
Cybersecurity Resources