#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Facebook Password Extractor - Get passwords stored in Web browsers

Facebook Password Extractor - Get passwords stored in Web browsers

Jun 02, 2011
Facebook Password Extractor - Get passwords stored in Web browsers Facebook Password Extractor is a free tool to recover passwords to Facebook accounts that are stored or cached in popular Web browsers. Supporting the latest versions of Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Google Chrome, Facebook Password Extractor can reveal login information for multiple Facebook accounts in just a click. Features: Shows Facebook passwords cached or stored in a variety of browsers Reveals stored login and password information instantly in just a click Supports all versions of Microsoft Internet Explorer, including IE7, IE8 and IE9 Supports all versions of Mozilla Firefox including Firefox 4 Supports all versions of Opera including Opera 11 Supports all versions of Google Chrome including Chrome 11 Supports all versions of Apple Safari including Safari 5 Reveals Facebook logins and passwords for all supported browsers Beats enhanced security model of I
NATO Vs Anonymous

NATO Vs Anonymous

Jun 02, 2011
NATO Vs Anonymous Oh Anonymous, now you're for it… NATO leaders have been warned that Wikileaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary – and promise to 'persecute' its members. In a toughly-worded draft report to the NATO Parliamentary Assembly, General Rapporteur Lord Jopling claims that the loose-knit, leaderless group is " becoming more and more sophisticated", and "could potentially hack into sensitive government, military, and corporate files ". NATO report threatens to 'persecute' Anonymous (Thinq) The NATO Draft Report
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia

Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia

Jun 02, 2011
Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia Hackers around the world are gaining more attention than usual in the last few months. Now Google has added another announcement to the pile that hundreds of Gmail accounts have been hacked recently. Now, Google affirms that the problem doesn't rest with Gmail security but rather this scheme was a result of phishing and malware. Google spilled the details on Wednesday via its official blog: Through the strength of our cloud-based security and abuse detection systems*, we recently uncovered a campaign to collect user passwords, likely through phishing. This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists. The goal of this effort seems to have bee
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w

National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w

Jun 01, 2011
National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w National Democratic Party (NPD) of Germany websites hacked by n0-N4m3 Cr3w hackers. List of hacked sites :  https://pastebin.com/3p5AwzZe  .  A message was displayed by hackers : First, a few words in advance. I am a proud German, I love Germany above everything, and I do everything in my power to improve the image of Germany. If the policy or the law this action on my part, prosecuted, my heart aches. Because if she does, all the great words of politicians are vain. Words such as: we will not allow that brings the NPD or the right wing of our children on the wrong track. We will do everything to the NPD or the Nazis to provide a stop. I know I'll come with my action on a broad public interest. That is exactly my goal. I want the Germans are proud of themselves and their country, on the history and achievements. The whole world envies us for our intelligence and knowledge. But ok, that is up to you. The NPD is to
Dating Funda Hacked over 1 lakh 45,000 user data hacked !
Wireshark 1.4.7 & Wireshark 1.2.17 Released

Wireshark 1.4.7 & Wireshark 1.2.17 Released

Jun 01, 2011
Wireshark 1.4.7 & Wireshark 1.2.17 Released Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.This update fixes many bugs. Supports for the following protocols have been updated – BSSMAP, DMP, GSM SMS, LDSS, NCP, PN/IO, PPP, SIP, SNMP. Download here
Cybersecurity Resources