#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Facebook Password Extractor - Get passwords stored in Web browsers

Facebook Password Extractor - Get passwords stored in Web browsers

Jun 02, 2011
Facebook Password Extractor - Get passwords stored in Web browsers Facebook Password Extractor is a free tool to recover passwords to Facebook accounts that are stored or cached in popular Web browsers. Supporting the latest versions of Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Google Chrome, Facebook Password Extractor can reveal login information for multiple Facebook accounts in just a click. Features: Shows Facebook passwords cached or stored in a variety of browsers Reveals stored login and password information instantly in just a click Supports all versions of Microsoft Internet Explorer, including IE7, IE8 and IE9 Supports all versions of Mozilla Firefox including Firefox 4 Supports all versions of Opera including Opera 11 Supports all versions of Google Chrome including Chrome 11 Supports all versions of Apple Safari including Safari 5 Reveals Facebook logins and passwords for all supported browsers Beats enhanced security model of I
NATO Vs Anonymous

NATO Vs Anonymous

Jun 02, 2011
NATO Vs Anonymous Oh Anonymous, now you're for it… NATO leaders have been warned that Wikileaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary – and promise to 'persecute' its members. In a toughly-worded draft report to the NATO Parliamentary Assembly, General Rapporteur Lord Jopling claims that the loose-knit, leaderless group is " becoming more and more sophisticated", and "could potentially hack into sensitive government, military, and corporate files ". NATO report threatens to 'persecute' Anonymous (Thinq) The NATO Draft Report
Making Sense of Operational Technology Attacks: The Past, Present, and Future

Making Sense of Operational Technology Attacks: The Past, Present, and Future

Mar 21, 2024Operational Technology / SCADA Security
When you read reports about cyber-attacks affecting operational technology (OT), it's easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the historical attacks to see how those types compare.  The Types of OT Cyber-Attacks Over the past few decades, there has been a growing awareness of the need for improved cybersecurity practices in IT's lesser-known counterpart, OT. In fact, the lines of what constitutes a cyber-attack on OT have never been well defined, and if anything, they have further blurred over time. Therefore, we'd like to begin this post with a discussion around the ways in which cyber-attacks can either target or just simply impact OT, and why it might be important for us to make the distinction going forward. Figure 1 The Pu
Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia

Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia

Jun 02, 2011
Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia Hackers around the world are gaining more attention than usual in the last few months. Now Google has added another announcement to the pile that hundreds of Gmail accounts have been hacked recently. Now, Google affirms that the problem doesn't rest with Gmail security but rather this scheme was a result of phishing and malware. Google spilled the details on Wednesday via its official blog: Through the strength of our cloud-based security and abuse detection systems*, we recently uncovered a campaign to collect user passwords, likely through phishing. This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists. The goal of this effort seems to have bee
cyber security

Automated remediation solutions are crucial for security

websiteWing SecurityShadow IT / SaaS Security
Especially when it comes to securing employees' SaaS usage, don't settle for a longer to-do list. Auto-remediation is key to achieving SaaS security.
National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w

National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w

Jun 01, 2011
National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w National Democratic Party (NPD) of Germany websites hacked by n0-N4m3 Cr3w hackers. List of hacked sites :  https://pastebin.com/3p5AwzZe  .  A message was displayed by hackers : First, a few words in advance. I am a proud German, I love Germany above everything, and I do everything in my power to improve the image of Germany. If the policy or the law this action on my part, prosecuted, my heart aches. Because if she does, all the great words of politicians are vain. Words such as: we will not allow that brings the NPD or the right wing of our children on the wrong track. We will do everything to the NPD or the Nazis to provide a stop. I know I'll come with my action on a broad public interest. That is exactly my goal. I want the Germans are proud of themselves and their country, on the history and achievements. The whole world envies us for our intelligence and knowledge. But ok, that is up to you. The NPD is to
Dating Funda Hacked over 1 lakh 45,000 user data hacked !
Wireshark 1.4.7 & Wireshark 1.2.17 Released

Wireshark 1.4.7 & Wireshark 1.2.17 Released

Jun 01, 2011
Wireshark 1.4.7 & Wireshark 1.2.17 Released Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.This update fixes many bugs. Supports for the following protocols have been updated – BSSMAP, DMP, GSM SMS, LDSS, NCP, PN/IO, PPP, SIP, SNMP. Download here
Cybersecurity Resources