#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Fedora Web Site Hacked, But the Servers Undamaged !

Fedora Web Site Hacked, But the Servers Undamaged !

Jan 27, 2011
An attacker who had credentials and the use of taxpayer Fedora Fedora server, but the project leaders say the assailants apparently managed to compromise any software or servers. An attacker has attempted to compromise the servers for the Fedora Project, the community version of Red Hat Enterprise Linux, but no damage or code servers, according to an e-mail sent to the Fedora mailing list on January 25 . In the statement, "a security incident on Fedora infrastructure" right Fedora Project manager Jared Smith revealed that the login and password Fedora contributor was stolen and used to access systems on January 22. It was a factor against those who had the right to run the code packages for Fedora SCM, build and manage to make updates to the Fedora packages, according to Smith. Donor had no sysadmin or Release Engineering teams, and had only limited rights fedorapeople.org wrote. Fedora Infrastructure team is investigating the incident and was unable to conclude that
Site of AT&T-iPad hackers is hacked !!

Site of AT&T-iPad hackers is hacked !!

Jan 27, 2011
Web site, a hacker group, whose members are accused of crimes committed after the hole in the exposed customers to AT & T iPad website last year, has been hacked today. At least a couple of hours, obscenity message loads to the site Goatse Security said: "I took the liberty to expose a gaping hole ... As you are self-grow group [profanity drafted], I also contacted the media that this case receives the coverage it deserves. "In cracking this site, send specially crafted requests to the server with my browser card false identity to that of an iPad. Please note that although not played great role in this crack _WAS_ poetic in many ways. Goatsec also gave me the same warning given to AT & T. .. not at all, to repair his hole. User Accounts have been removed, and passwords changed, "it said. This message gave "props" of the FBI and some of the hackers and made disparaging references to AT & T and Apple, for example. Previously CNET contacted by
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Hacker held for blackmailing girl !

Hacker held for blackmailing girl !

Jan 27, 2011
Saudi police have arrested a man who used his computer skills to blackmail a local student at the University invading his laptop and seize private photos of her, a newspaper said Thursday. The gunman, 34, threatened the Saudi girl aged 23, was going to meet your photos on websites that if she goes with him. When she refused, he made his threat. He called his cell phone and his home and threatened to kidnap him if he rejects his demands, Alhiad language Arab newspaper said in a report in the central city of Mecca. "Then he said to his father, who informed the police. The police after a brief examination found the man and took him."
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Government Sites, Military And Educational For Sale By Hackers !!

Government Sites, Military And Educational For Sale By Hackers !!

Jan 27, 2011
A hacker has a number of sites belonging to government agencies, military and educational for sale on internet forums. The discovery was made by Noa Bar-Yosef, a senior security strategist at security vendor Imperva. Bar-Yosef, wrote about it in the company's blog last Friday, noting that prices range from $ 33 from $ 499. In addition, personally identifiable information obtained by the infiltrators sites has also been sold for about $ 20 billion records. Although details of the written Imperva screenshots shown as evidence, security blogger Brian Krebs has published additional information indicating the websites that belong to the states of Utah and Michigan as available for sale, including the site belonging U.S. Communications Army-Electronics Command (CECOM), which is the cyber army unit. The heart of the matter is how web servers poorly supported or corrected may be vulnerable to attacks, regardless of their size (or size) of their own organization. I did a quick check, a
Mail & Guardian website down after hack attack !!

Mail & Guardian website down after hack attack !!

Jan 26, 2011
Cape Town - The  Mail & Guardian  website has been shut down over a hacking attack, the company announced on Wednesday. "The Mail & Guardian's website is under sustained attack by hackers. We are dealing with the problem, but to make absolutely sure that your security isn't compromised, we have decided to suspend the service temporarily," it announced on its website. More information will be released as it becomes available. In 2010, several government websites were hacked, including the website of the National Prosecuting Authority as well as ISP MWEB. "I don't think South African websites in particular are being targeted, but this one may be a particular group," HackingStats.com CEO Rian Visser told News24. "The big hackers weren't behind this attack," he added. Server attack Visser said that the Mail & Guardian website was hosted by an American server that was the subject of the attack. "M&G is hosted
Facebook Founder, Mark Zuckerberg's Facebook Fan Page Hacked !

Facebook Founder, Mark Zuckerberg's Facebook Fan Page Hacked !

Jan 26, 2011
It turns out even if you own the Internet, you're still susceptible to malicious hackers. Facebook CEO Mark Zuckerberg had to change Web addresses for his Facebook fan page late Tuesday night after a hacker appeared to gain access to the page and had the ability to write status messages on behalf of Facebook's chief. "Let the hacking begin: If facebook  [sic]  needs money, instead of going to the banks, why doesn't Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a 'social business' the way Nobel Price  [sic]  winner Muhammad Yunus described it? https://bit.ly/fs6rT3 What do you think? #hackercup2011,"  The bit.ly link in the message points to  this Wikipedia page  about "social business," a concept developed primarily by Yunus, a Bangladeshi economist. A social business is a company that exists to achieve specific social objectives such as to overcome poverty or increase access to technology. Founders and
OpenDNS : Facebook Was The Most Blocked Site In 2010 !

OpenDNS : Facebook Was The Most Blocked Site In 2010 !

Jan 26, 2011
According to a new report (PDF) of the DNS provider OpenDNS and online safety, social networking site Facebook was the most secure site in 2010. In this context, means blocking OpenDNS customers specially configured DNS and security services to prevent their users to connect, probably beyond the interest of safety, to prevent people from wasting time at work, resources or through corporate or organizational inappropriately. But, Facebook ranked high on another list: it was the second most in white list, which means sites that are specifically exempted from the rules of safety or crash. "Overall, 2010 was just a social trend that is reflected in the data we see," said founder and CEO David Ulevitch OpenDNS said in a statement. "Facebook is both blocked most sites and most authoritative, reflecting the push / pull to allow social sites in schools and the workplace. " Open five most commonly found in blacklisting sites in 2010 were on Facebook, MySpace, YouTube, Do
Hackers get access to N.J. school data system !

Hackers get access to N.J. school data system !

Jan 26, 2011
4chan users online bulletin board has been able to access the online information system used by student school district in New Jersey after the administrator password of the school was registered last week 4chan. The trouble began last Tuesday, according to Plainfield Board of Education, which serves a small school district just west of Newark. It is when someone sends you a link to the login page and the name of the administrator ("admin") and password ("poopnugget) District Information System Genesis 4chan, forum popular, but anarchy is best known as the place where David Kernell posted information on the account of his previous burglary Alaska Governor Sarah Palin Yahoo e-mail. web-based software used in Genesis about 160 schools in New Jersey to manage student records and to communicate with students and parents. It is not clear how much damage was caused, but 4chan members began posting screenshots soon as they could mess with the school system. A screenshot s
NATO networks vulnerable to cyber threat !

NATO networks vulnerable to cyber threat !

Jan 26, 2011
BRUSSELS (AFP) - NATO's military networks are not fully protected against cyber threats and the alliance must make good on a promise to erect a virtual wall in 2012, a defense official U.S. says Tuesday top. U.S. Deputy Secretary of Defense William Lynn warned after a two-day visit to Brussels that cyber-threats were "mature" from a tool of espionage and disruption to a force cons destructive of critical infrastructure. "I think the discussion about NATO at this time, the step threshold is that we must be able to protect our own military networks, and frankly we're not there yet," Lynn said after meetings with EU and NATO and the private sector. [For complete coverage of politics and policy, go to Yahoo! Politics] Pentagon number two recalled that NATO has made the fight against cyber threats a top priority in November, when NATO leaders agreed Cyber Incident Response Centre at full operational capacity in 2012 three years ahead of schedule . &quo
Cybersecurity
Expert Insights
Cybersecurity Resources