#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

All about Microsoft Windows 8 !

All about Microsoft Windows 8 !

Jan 31, 2011
Only Microsoft knows how the abutting adaptation of its Windows operating arrangement will attending and what it will be called, but big changes could be advanced for the OS that assemblage accredit to as "Windows 8." At this year's Consumer Electronics Appearance in Las Vegas, Microsoft appear that Windows 8 will abutment system-on-a-chip architectures appliance ARM processors. Unlike the x86 architectonics that today's Windows laptops and desktops assignment with, ARM-based chips tend to run such low-power accessories as tablets and smartphones. In his CES keynote speech, Microsoft CEO Steve Ball­mer said, "This advertisement is absolutely all about enabling a fresh chic of hardware, and fresh silicon ally for Windows, to accompany the widest accessible ambit of anatomy factors to the market." In added words, Windows won't be aloof for laptops and desktops anymore. Actual Facts Microsoft's ARM advertisement represents the firm's abando
1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !!

1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !!

Jan 31, 2011
1600 New Web Sites Hacked by Hamdi HaCker ( The 077 ) !! List of Hacked sites :  https://pastebin.com/cdxbYKjz Zone-H Link :  https://www.zone-h.org/archive/notifier=The%20077 News Source : Hamdi HaCker ( The 077 ) | Via Fb msg
Smart Systems restore over hacked 295 websites !

Smart Systems restore over hacked 295 websites !

Jan 31, 2011
Over bisected of the websites, whose hostings are serviced by Smart Systems accept been restored. Currently, the aggregation gain with adjustment works. The server of Smart Systems was attacked by a accumulation of hackers, what has resulted in malfunction of 295 websites on January 29. Instead of the aboriginal content, the hackers acquaint anti-Armenian slogans in Turkish language. The websites of the Armenian Center for Contemporary Experimental Art, POPOK all-embracing announcement festival, School for Young Leaders, a ambit of online shops and bartering companies were amid those, which suffered from the attack. Besides, Armenian aperture of job announcements - job.am - and the website of Armenian accompanist Emmy, who will represent Armenia at Eurovision Song Contest 2011, were additionally down.
cyber security

Protecting Your Organization From Insider Threats - All You Need to Know

websiteWing SecuritySaaS Security
Get practical insights and strategies to manage inadequate offboarding and insider risks effectively.
What's the Right EDR for You?

What's the Right EDR for You?

May 10, 2024Endpoint Security / Threat Detection
A guide to finding the right endpoint detection and response (EDR) solution for your business' unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint detection and response (EDR) solutions now serve as critical weapons in the fight, empowering you and your organization to detect known and unknown threats, respond to them quickly, and extend the cybersecurity fight across all phases of an attack.  With the growing need to defend your devices from today's cyber threats, however, choosing the right EDR solution can be a daunting task. There are so many options and features to choose from, and not all EDR solutions are made with everyday businesses and IT teams in mind. So how do you pick the best solution for your needs? Why EDR Is a Must Because of
Hobbit helmsman Jackson trap in $190K credit card scam !

Hobbit helmsman Jackson trap in $190K credit card scam !

Jan 30, 2011
Lord of the Rings Director Peter Jackson was the ambition of a US$190,000 (£120,000) acclaim agenda artifice that approved to bond out a disturbing business. The recently-knighted Hobbit helmsman acclimated his American Express agenda to shop for items from the Michigan Toy Soldier Company, which specialises in the auction of actual miniatures. Richard Berry, buyer of the company, acclimated the capacity to cut counterfeit invoices in adjustment to accumulate his disturbing business afloat, a US cloister has heard, the Daily Telegraph reports. Berry, who admits fraud, faces a best book of 18 months abaft bars. Berry's lawyer, David Steingold, told the court: "He bare account and acclimated the acclaim card, and hoped to accord the money aback sales best up." "Things got out of duke because the abridgement didn't about-face around," he added. Sir Peter was not larboard out of abridged as a aftereffect of the scam. Berry, who has already paid Am Ex
Zero day vulnerability begin in Windows MHTML renderer !

Zero day vulnerability begin in Windows MHTML renderer !

Jan 30, 2011
Microsoft has aloof appear aegis advising 2501696 acknowledging a fresh aught day blemish in all accepted versions of Windows (except Server Core). The blemish appears to acquiesce maliciously crafted web pages to assassinate cipher in any "zone" behindhand of which area is specified. Any applications that use Microsoft's HTML renderer can be attacked including Internet Explorer, but applications that consistently accessible web agreeable in the "Restricted zone" are not afflicted including Outlook, Outlook Express, and Windows Mail. There is affidavit of abstraction cipher in the agrarian and it seems to be alone a amount of time afore we see abyss aggravating to accomplishment this flaw. For individuals, or bodies who alone administer a baby cardinal of computers, Microsoft has provided a Fix it apparatus that allows to to administer their recommended settings after accepting to use GPOs or accepting to manually adapt anthology keys. The SANS Internet St
Spam from Egypt vanishes afterwards acid off internet access !

Spam from Egypt vanishes afterwards acid off internet access !

Jan 30, 2011
If there is any agnosticism as to how deeply internet communications accept been belted in Egypt, We has produced some absorbing statistics. In the action of allegory spam, one of our Vancouver advisers noticed that spam basic from Egypt had about vanished. While there accept been letters that Egypt had cut off internet casework completely, there were adverse letters suggesting that one ISP that accounts for about 8% of Egyptian users was still online to some degree. According to our statistics, the bulk of spam accustomed from Egypt in the aftermost two canicule has alone by 85%. While I'm not advocating this as a adjustment to stop the spam problem, it seems to affirm media letters of the admeasurement to which internet admission is currently accessible (or unavailable, as it were) to the Egyptian people. While you may accept a lower adventitious of accepting an email proclaiming you've won the Cairo lottery, this won't accept any cogent appulse on the aggregate of s
Facebook Awarded More Than $ 360 Million In Damages Against Spammer

Facebook Awarded More Than $ 360 Million In Damages Against Spammer

Jan 30, 2011
Facebook's security team have reason to celebrate as they have claimed another scalp in the ongoing fight against spammers on the social network. A post on Facebook's Security page announced that this week a federal court has awarded the firm a whopping $360,500,000 in statutory damages and issued a permanent injunction against spammer Philip Porembski. US district court judge Jeremy Fogel made the judgement against Porembski, who ran a firm called PP Web Services. Porembski was alleged to have obtained the login details of at least 116,000 Facebook users, and sent more than 7.2 million spam messages to victims' online friends. Some of the spam messages directed users to phishing websites that stole usernames and passwords, while others made money for Porembski every time someone clicked on the links. A computer discovered by the Sacramento County Sherrif's Department, which was thought to belong to Philip Porembski, was found to contain more than 160,000 Face
IPS officer's Facebook profile hacked !

IPS officer's Facebook profile hacked !

Jan 29, 2011
RAJKOT: A day after Facebook CEO Mark Zuckerberd's Facebook profile was hacked, someone hacked the Facebook profile of an IPS officer in Saurashtra. The unknown hacker uploaded embarrassing photos. The officer's profile picture was replaced with an obscene morphed photo. The miscreant has also changed the officer's basic information; political views, religious views, philosophy etc on his Facebook profile. The hacker also uploaded more than 24 photos of eunuchs to the profile. As soon as he came to know about it, the officer changed his hacked profiles and intimated his Facebook friends.
Certified Ethical Hacker Version 7 (CEHv7) has arrived !!

Certified Ethical Hacker Version 7 (CEHv7) has arrived !!

Jan 28, 2011
Certified Ethical Hacker Version 7 (CEHv7) has arrived !! Revolutionary Product    EC-Council releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. EC-Council has spent years in developing this version. Don't miss it click down the link to register for a preview class.   Internet threats   Websites, Computer systems and Networks of government bodies and organizations worldwide are under constant threat of hacking and intrusion. The attacks pose threat to security, integrity and confidentiality of information available on the databases stored on the affected systems.  Hacking Attacks have evolved over the years and are growing in sophistication and precision.  Easily available attack toolkits enable even a novice to initia
Two Arrested For Hacking Accounts, Card Cloning !

Two Arrested For Hacking Accounts, Card Cloning !

Jan 28, 2011
South District Police has arrested a gang of miscreants and arrested two people accused of hacking accounts for international clients' and to make a clone of your bank or credit cards of different banks. The third defendant is untraceable. A gang of three youths, who are experts at hacking into client data reported. The trio has recorded on the accounts of customers in Nigeria, police said. Duo - Dharmesh (24) and Sheikh Rashid (24) - were arrested from Saket in South Delhi, January 25 after an official complaint investigations and foreign Axis Bank has caused a huge loss for the bank using the cloned cards in the names of the various customers. Sheikh had earlier been arrested by Mumbai police in 2010 for his contribution to a farce anyway. It 'been in prison for three months. When released on bail, he met Ahmed and Dharmesh, have been born and a plan to trick people to clone cards. Dharmesh acquainted with one of Alim Sheikh is located in Andheri west and learned the art
Former British Labour cabinet minister says her phone was hacked !

Former British Labour cabinet minister says her phone was hacked !

Jan 28, 2011
LONDON: Former British cabinet minister confirmed that his work phone was cut 28 times - and now seek a court order to see if it happened again later that week. Tessa Jowell, the former Olympics minister, is the oldest politician so far to be sure that his phone message was kidnapped and has joined a long list of celebrities who have hired lawyers to find out who ordered the hacking is a civil court. The news emerged at the end of a tumultuous week in which Scotland Yard was forced to reopen its investigation into the hacking of the New World, after the News Corporation-owned tabloid even provided "important information" in another editor, Ian Edmondson, who was fired this week. Advertising: The story continues below And on Thursday, a former age and the Herald Sun journalist, Bruce Guthrie - will be charged in London on a former editor of Murdoch - has warned the culture secretary, Jeremy Hunt, the editorial safeguards against against News International, in 'con
FBI Conducts Search Warrants At 40 "anonymous" Supporters Wikileaks !

FBI Conducts Search Warrants At 40 "anonymous" Supporters Wikileaks !

Jan 28, 2011
The FBI announced today that they have executed over 40 search warrants in connection with the UK Metropolitan Police against Wikileaks DDoS'ing participants of "enemies." Unlike police met, the FBI did not reveal many details about who may have executed the arrest warrants against, or more precisely what they sought. It is likely that the intention to seize equipment used in the attacks compared with the papers relating to the planning and execution of attacks. FBI press release indicates that the attackers created tools to attack Mastercard, Visa and others. I think most of the attackers used an "off the shelf" DDoS tool called Loic is not linked to "Anonymous". Loic was developed by Alexander M. Batishchev which by definition makes no anonymous ... This suggests that the creation of a multitool that is why they are running the command of the strike a chill in me. It would be like going after Stanley Tools for the manufacture of the hijacker
Cybersecurity
Expert Insights
Cybersecurity Resources