#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

OpenDNS : Facebook Was The Most Blocked Site In 2010 !

OpenDNS : Facebook Was The Most Blocked Site In 2010 !

Jan 26, 2011
According to a new report (PDF) of the DNS provider OpenDNS and online safety, social networking site Facebook was the most secure site in 2010. In this context, means blocking OpenDNS customers specially configured DNS and security services to prevent their users to connect, probably beyond the interest of safety, to prevent people from wasting time at work, resources or through corporate or organizational inappropriately. But, Facebook ranked high on another list: it was the second most in white list, which means sites that are specifically exempted from the rules of safety or crash. "Overall, 2010 was just a social trend that is reflected in the data we see," said founder and CEO David Ulevitch OpenDNS said in a statement. "Facebook is both blocked most sites and most authoritative, reflecting the push / pull to allow social sites in schools and the workplace. " Open five most commonly found in blacklisting sites in 2010 were on Facebook, MySpace, YouTube, Do
Hackers get access to N.J. school data system !

Hackers get access to N.J. school data system !

Jan 26, 2011
4chan users online bulletin board has been able to access the online information system used by student school district in New Jersey after the administrator password of the school was registered last week 4chan. The trouble began last Tuesday, according to Plainfield Board of Education, which serves a small school district just west of Newark. It is when someone sends you a link to the login page and the name of the administrator ("admin") and password ("poopnugget) District Information System Genesis 4chan, forum popular, but anarchy is best known as the place where David Kernell posted information on the account of his previous burglary Alaska Governor Sarah Palin Yahoo e-mail. web-based software used in Genesis about 160 schools in New Jersey to manage student records and to communicate with students and parents. It is not clear how much damage was caused, but 4chan members began posting screenshots soon as they could mess with the school system. A screenshot s
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
NATO networks vulnerable to cyber threat !

NATO networks vulnerable to cyber threat !

Jan 26, 2011
BRUSSELS (AFP) - NATO's military networks are not fully protected against cyber threats and the alliance must make good on a promise to erect a virtual wall in 2012, a defense official U.S. says Tuesday top. U.S. Deputy Secretary of Defense William Lynn warned after a two-day visit to Brussels that cyber-threats were "mature" from a tool of espionage and disruption to a force cons destructive of critical infrastructure. "I think the discussion about NATO at this time, the step threshold is that we must be able to protect our own military networks, and frankly we're not there yet," Lynn said after meetings with EU and NATO and the private sector. [For complete coverage of politics and policy, go to Yahoo! Politics] Pentagon number two recalled that NATO has made the fight against cyber threats a top priority in November, when NATO leaders agreed Cyber Incident Response Centre at full operational capacity in 2012 three years ahead of schedule . &quo
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Google And Mozilla To Make "Do Not Track" Stages !

Google And Mozilla To Make "Do Not Track" Stages !

Jan 26, 2011
SAN FRANCISCO (AFP) - Mozilla and Google, on Monday took steps to give people privacy online, but most everyone said obstacles remain to create simple "Do not follow the software buttons for web browsing . Mozilla has proposed the addition of a signal of its popular Firefox browser that allows users to automatically prompt sites do not monitor their online activities. Web sites then decide whether to grant or desire to continue collecting data for purposes such as targeting Internet advertising. Firefox users would be able to convey what I want to watch a third based on advertising by setting the browsers send a "Do not follow the HTTP header" on each click or page view. "The problem with adding this to the head is that you have both browsers and sites to be implemented to be fully effective," the Mozilla technology and privacy of Alex Fowler, acknowledged in a blog. "Mozilla recognizes the chicken and egg problem, and will propose that this fun
Spam Search Engine Booming : Google

Spam Search Engine Booming : Google

Jan 26, 2011
If you've noticed lately that Google search results is a bit of spam, you're not alone. In a blog post, Google senior engineer Matt Cutts acknowledged that "we have seen a slight increase in spam in recent months, and the tech pushes critical observers. Cutts then introduced new initiatives to improve the quality of Google search results. Among them: Google has a new "document-level classifier, which detects the best features of spam, such as key words often repeated, and Google is improving its ability to detect the hacked sites, which were a major source of spam last year, and is considering other changes, including a campaign against websites that are mainly copying content from other sites. But the question of "farm content" Cutts does not have all the answers. If you are not familiar with the term, you probably met some sellers of content. For example, many people call the media sites and content companies AssociatedContent Demand Media. A lot of
First Cyber police unit launched in Iran !!

First Cyber police unit launched in Iran !!

Jan 26, 2011
TEHRAN - Iran has officially launched on Sunday cyber police unit to tackle crime on the Internet and cons of social networks that spread "espionage and strife," said Police Chief Esmaeil Ahmadi Moghaddam. The first country on the website of the surveillance equipment is in operation in the capital, Tehran, while police stations across the country have their cyber units at the end of Iranian year, March 21, was quoted as saying the state news agency IRNA. Ahmadi Moghaddam said police will counter-revolutionary groups and cyber dissidents who used the Internet, social networks in 2009 to launch protests against the reelection of President Mahmoud Ahmadinejad. "With these social networks in our country, groups of counter-revolutionaries and dissidents be riots and other foreign countries and contact the fire, he said, referring to the anti-Ahmadinejad protests, which led to widespread unrest in Tehran, where tens of people died. Supporters of rival candidates used
Wikileaks said - No, We Do Not Hack The Icelandic Parliament !

Wikileaks said - No, We Do Not Hack The Icelandic Parliament !

Jan 25, 2011
Although some of the United States has accused the Wikileaks to steal data from peer-to-peer file-sharing, the second, was the guest of the payment to the surface in Iceland late last week: that the group informant in some a computer spy planted "in the Parliament building. A brief article in the Icelandic daily Morgunbladid law last Thursday reported that a mysterious PC was found in the Althing, the strengthening of the legislative capital of Reykjavik, in February last year. The team was in an empty room near the office of Birgitta Jonsdottir, a member of parliament who was appointed to the U.S. Department Justice probe of Wikileaks, despite the severance of ties with the group last summer. The newspaper reported that the police investigation has led to suspicions that the equipment was used for espionage, and, although no data or identity of the team gave no clues about its origins, Wikileaks was one of the suspects. Kristinn Icelandic Wikileaks Hrafnson categorically den
PINK's Twitter account Hacked By Husband Carey Hart !

PINK's Twitter account Hacked By Husband Carey Hart !

Jan 25, 2011
This morning, Rosa has been the target of an infamous pirate Twitter - her husband, Carey Hart! After tweeted a video for its nearly three million supporters, she walked away. And then he entered Carey tweeted, "wow, I have the right shit so bad today ... .." Then came the bill, "company .... sorry ..." Later, he realized what he had done, and Twitter that "my man f3cking asshole just raped my Twitter account. I do not write this. My friends suck too much." Then he said: "I go to sleep. Alone. Have fun on the couch monkey butt" after this "Dick Butch Walker @ RT @ pink ehh just do not have to leave the room we have on the computer. Boom!" For fun!
Will Hill Says Twitter Account Has Been Hacked !

Will Hill Says Twitter Account Has Been Hacked !

Jan 25, 2011
A day after feeling that Twitter has been the denigration of Jay Cutler, a former Florida safety of Hill wanted to put in your Twitter account. Hill, Pat Dooley occur on Monday to see the 105-game (WYGC, 104.9-FM), says that his Twitter account has been hacked into and inappropriate messages was credited to him. He had been criticized for tweets that appeared in the account @ Trill_SG. This account has been canceled. "What is Twitter just came to me," he said Monday. "I've been on Twitter for the last five or six months. I invited people to watch what was happening. I deleted all but a few bloggers to cut and paste a few things. Somehow, my thing has been violated. "It was hard for me. I never disrespect to the nation or the Gator coach (Will) Muschamp or Urban Meyer. I do not want people to think of me as a bad person." Hill, who said in the NFL draft, works in Boca Raton to TEST Football Academy with Brian Martin and Kevin Dunn to prepare for the
Nicolas Sarkozy's Facebook hacked !

Nicolas Sarkozy's Facebook hacked !

Jan 25, 2011
Over the weekend, but fans of French President Nicolas Sarkozy is an amazing update their Facebook news feed, "Dear compatriots, given the unusual circumstances of our country is going through, I decided in my mind and conscience not to run for office again at the end of my term in 2012, a paper read alongside Nicolas Sarkozy, AFP reported. The note also urged fans to celebrate his resignation and have a drink on May 6, 2012. One hundred people enjoyed the note, which contains a number of misspellings. A few hours later, the note was removed and a new note it replaced. He laughed at the spelling errors, "said Sarkozy enjoyed writing lesson, but the conclusion that the message was a bit hasty." My Facebook account was hacked tonight, maybe I remember that no system is foolproof ... Thanks to those who have recognized the error, and thanks again for your support, "the message read.
Expert Insights
Cybersecurity Resources