#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Bing caught copying search results from Google !

Bing caught copying search results from Google !

Feb 02, 2011
In a case of Internet espionage that makes the antics of double agent Cold War operatives seem like frivolous child play, Bing has been caught stealing search results from Google with its Bing toolbar and IE8's Suggested Sites feature. Google first suspected foul play in May 2010. By October 2010, with Bing results beginning to look uncannily like Google's, it knew something had to be done about it -- and so, in true, nerdtastic style, Google set up a sting to prove that Microsoft was actually behind the wholesale mimicry of Google's search results.   One of Google's 'sting' queries A few days later, the same result on Bing Google injected "synthetic" results into its search engine -- fake queries and results that no real user or engine would ever generate. Then, on D-Day, December 17, about 20 Google engineers were asked to run the test queries with Internet Explorer 8, Bing Bar and Suggested Sites. By December 31, some of these fake results beg
Get Free CEH V7 Training via EC-Council to 375 selected professionals around the world !

Get Free CEH V7 Training via EC-Council to 375 selected professionals around the world !

Feb 02, 2011
How to get FREE CEH V7 Training? EC-Council is going to be selecting 125 information security professionals from all over the world to be part of the inaugural CEH V7 launch for FREE ! That's right, you heard it right. It is Absolutely Free ! You can be one of the 125 Information Security Professionals who would be granted FREE Seats for the upcoming Launch Class of CEH v7. All you need is register at https://eccouncil.wufoo.com/forms/ceh-v7/. In 50 words, tell us why you should be selected ( Tip : Tell you the certifications you hold, the job you do, the company you work for and how this class will benefit you) Only the BEST would be selected, so make sure your application stands out from the crowd. As only 125 profesionals from all over the world will qualify, make your application early! Applications are open until 12 p.m. EST, on the 6th of February, 2011. All successful candidates shall be notified by February 14th, 2011. Benefits: The winners are entitled to other benef
Network Threats: A Step-by-Step Attack Demonstration

Network Threats: A Step-by-Step Attack Demonstration

Apr 25, 2024Endpoint Security / Cyber Security
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit edge-case vulnerabilities. Instead, they often use commonly available tools and exploit multiple vulnerability points. By simulating a real-world network attack, security teams can test their detection systems, ensure they have multiple choke points in place, and demonstrate the value of networking security to leadership. In this article, we demonstrate a real-life attack that could easily occur in many systems. The attack simulation was developed based on the MITRE ATT&CK framework, Atomic Red Team,  Cato Networks ' experience in the field, and public threat intel. In the end, we explain why a holistic secur
Indian Army blames Facebook for Violence in Kashmir !

Indian Army blames Facebook for Violence in Kashmir !

Feb 02, 2011
The Indian Army believes that arch amusing networking armpit Facebook has played a key role in annoying abandon in Jammu & Kashmir. According to the Army, Facebook and some added amusing networking sites are actuality acclimated to advance abrogating attack adjoin the Army and added aegis agencies. S A Hasnain, General Officer Commanding of the Srinagar-based 15 Corps bidding his apropos while acclamation the mediapersons at an Army action at Khanabal in South Kashmir. The acceleration of amusing media has already brought anarchy in abounding countries, including Egypt. The Army believes that these amusing media sites may afflict the accord and accord in the basin in future.
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Breaking News : Google offers "speak-to-tweet" Account to Egyptians !

Breaking News : Google offers "speak-to-tweet" Account to Egyptians !

Feb 02, 2011
Google in aggregate with micro-blogging armpit Twitter has offered a fresh account for tweeting after an internet connection. The account "speak-to-tweet" allows Egyptian users to leave voice-mail bulletin that will be angry into tweets. According to a description on Google's blog, the account has been advised accurately for users in Egypt who are clumsy acquaint through internet with others due to advancing abandon in the country. The fresh account "speak-to-tweet" allows anyone to punch any three all-embracing numbers and leave articulation messages. The letters will be automatically beatific out as tweets with #egypt. The numbers are +16504194196 or +390662207294 or +97316199855 that will advice Egyptians to break in blow after internet connection.
Anonymous Hackers Providing Communication Tools For Egyptian People !

Anonymous Hackers Providing Communication Tools For Egyptian People !

Feb 02, 2011
"Internet not working, badge cars burning," beatific out one Egyptian. "Today marks a abundant day for Egypt," beatific out another. These letters weren't advancing from adaptable phones or computers, but from an abecedarian radio sending out Morse Code about amidst the anarchy in Egypt. The Egyptian government's efforts to absolute communications aural the country has triggered a beachcomber of activism from an all-embracing accumulation of chargeless accent activists on the Internet alleged Telecomix. Organizing application babble rooms, wikis, and collaborative autograph tools, this abundantly bearding accumulation has formed to acquaint Egyptians about their communications options while accepting admission letters from them. Telecomix has ahead formed on chargeless accent efforts in Tunisia, Iran, China and added countries who accept approved to abridge or block genitalia of the Internet. Egypt has been articular as a "top priority" for
Expert Insights
Cybersecurity Resources