#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Hacker held for blackmailing girl !

Hacker held for blackmailing girl !

Jan 27, 2011
Saudi police have arrested a man who used his computer skills to blackmail a local student at the University invading his laptop and seize private photos of her, a newspaper said Thursday. The gunman, 34, threatened the Saudi girl aged 23, was going to meet your photos on websites that if she goes with him. When she refused, he made his threat. He called his cell phone and his home and threatened to kidnap him if he rejects his demands, Alhiad language Arab newspaper said in a report in the central city of Mecca. "Then he said to his father, who informed the police. The police after a brief examination found the man and took him."
Government Sites, Military And Educational For Sale By Hackers !!

Government Sites, Military And Educational For Sale By Hackers !!

Jan 27, 2011
A hacker has a number of sites belonging to government agencies, military and educational for sale on internet forums. The discovery was made by Noa Bar-Yosef, a senior security strategist at security vendor Imperva. Bar-Yosef, wrote about it in the company's blog last Friday, noting that prices range from $ 33 from $ 499. In addition, personally identifiable information obtained by the infiltrators sites has also been sold for about $ 20 billion records. Although details of the written Imperva screenshots shown as evidence, security blogger Brian Krebs has published additional information indicating the websites that belong to the states of Utah and Michigan as available for sale, including the site belonging U.S. Communications Army-Electronics Command (CECOM), which is the cyber army unit. The heart of the matter is how web servers poorly supported or corrected may be vulnerable to attacks, regardless of their size (or size) of their own organization. I did a quick check, a
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
Mail & Guardian website down after hack attack !!

Mail & Guardian website down after hack attack !!

Jan 26, 2011
Cape Town - The  Mail & Guardian  website has been shut down over a hacking attack, the company announced on Wednesday. "The Mail & Guardian's website is under sustained attack by hackers. We are dealing with the problem, but to make absolutely sure that your security isn't compromised, we have decided to suspend the service temporarily," it announced on its website. More information will be released as it becomes available. In 2010, several government websites were hacked, including the website of the National Prosecuting Authority as well as ISP MWEB. "I don't think South African websites in particular are being targeted, but this one may be a particular group," HackingStats.com CEO Rian Visser told News24. "The big hackers weren't behind this attack," he added. Server attack Visser said that the Mail & Guardian website was hosted by an American server that was the subject of the attack. "M&G is hosted
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Facebook Founder, Mark Zuckerberg's Facebook Fan Page Hacked !

Facebook Founder, Mark Zuckerberg's Facebook Fan Page Hacked !

Jan 26, 2011
It turns out even if you own the Internet, you're still susceptible to malicious hackers. Facebook CEO Mark Zuckerberg had to change Web addresses for his Facebook fan page late Tuesday night after a hacker appeared to gain access to the page and had the ability to write status messages on behalf of Facebook's chief. "Let the hacking begin: If facebook  [sic]  needs money, instead of going to the banks, why doesn't Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a 'social business' the way Nobel Price  [sic]  winner Muhammad Yunus described it? https://bit.ly/fs6rT3 What do you think? #hackercup2011,"  The bit.ly link in the message points to  this Wikipedia page  about "social business," a concept developed primarily by Yunus, a Bangladeshi economist. A social business is a company that exists to achieve specific social objectives such as to overcome poverty or increase access to technology. Founders and
OpenDNS : Facebook Was The Most Blocked Site In 2010 !

OpenDNS : Facebook Was The Most Blocked Site In 2010 !

Jan 26, 2011
According to a new report (PDF) of the DNS provider OpenDNS and online safety, social networking site Facebook was the most secure site in 2010. In this context, means blocking OpenDNS customers specially configured DNS and security services to prevent their users to connect, probably beyond the interest of safety, to prevent people from wasting time at work, resources or through corporate or organizational inappropriately. But, Facebook ranked high on another list: it was the second most in white list, which means sites that are specifically exempted from the rules of safety or crash. "Overall, 2010 was just a social trend that is reflected in the data we see," said founder and CEO David Ulevitch OpenDNS said in a statement. "Facebook is both blocked most sites and most authoritative, reflecting the push / pull to allow social sites in schools and the workplace. " Open five most commonly found in blacklisting sites in 2010 were on Facebook, MySpace, YouTube, Do
Hackers get access to N.J. school data system !

Hackers get access to N.J. school data system !

Jan 26, 2011
4chan users online bulletin board has been able to access the online information system used by student school district in New Jersey after the administrator password of the school was registered last week 4chan. The trouble began last Tuesday, according to Plainfield Board of Education, which serves a small school district just west of Newark. It is when someone sends you a link to the login page and the name of the administrator ("admin") and password ("poopnugget) District Information System Genesis 4chan, forum popular, but anarchy is best known as the place where David Kernell posted information on the account of his previous burglary Alaska Governor Sarah Palin Yahoo e-mail. web-based software used in Genesis about 160 schools in New Jersey to manage student records and to communicate with students and parents. It is not clear how much damage was caused, but 4chan members began posting screenshots soon as they could mess with the school system. A screenshot s
Cybersecurity Resources