#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Facebook Password Extractor - Get passwords stored in Web browsers

Facebook Password Extractor - Get passwords stored in Web browsers

Jun 02, 2011
Facebook Password Extractor - Get passwords stored in Web browsers Facebook Password Extractor is a free tool to recover passwords to Facebook accounts that are stored or cached in popular Web browsers. Supporting the latest versions of Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Google Chrome, Facebook Password Extractor can reveal login information for multiple Facebook accounts in just a click. Features: Shows Facebook passwords cached or stored in a variety of browsers Reveals stored login and password information instantly in just a click Supports all versions of Microsoft Internet Explorer, including IE7, IE8 and IE9 Supports all versions of Mozilla Firefox including Firefox 4 Supports all versions of Opera including Opera 11 Supports all versions of Google Chrome including Chrome 11 Supports all versions of Apple Safari including Safari 5 Reveals Facebook logins and passwords for all supported browsers Beats enhanced security model of I
NATO Vs Anonymous

NATO Vs Anonymous

Jun 02, 2011
NATO Vs Anonymous Oh Anonymous, now you're for it… NATO leaders have been warned that Wikileaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary – and promise to 'persecute' its members. In a toughly-worded draft report to the NATO Parliamentary Assembly, General Rapporteur Lord Jopling claims that the loose-knit, leaderless group is " becoming more and more sophisticated", and "could potentially hack into sensitive government, military, and corporate files ". NATO report threatens to 'persecute' Anonymous (Thinq) The NATO Draft Report
Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia

Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia

Jun 02, 2011
Chinese Hacker Cracks Hundreds of Gmail Accounts of U.S. & Asia Hackers around the world are gaining more attention than usual in the last few months. Now Google has added another announcement to the pile that hundreds of Gmail accounts have been hacked recently. Now, Google affirms that the problem doesn't rest with Gmail security but rather this scheme was a result of phishing and malware. Google spilled the details on Wednesday via its official blog: Through the strength of our cloud-based security and abuse detection systems*, we recently uncovered a campaign to collect user passwords, likely through phishing. This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists. The goal of this effort seems to have bee
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
How to Make Your Employees Your First Line of Cyber Defense

How to Make Your Employees Your First Line of Cyber Defense

May 01, 2024Security Awareness Training
There's a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you've got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your organization has a standing guard, you're only as secure as your weakest link. There's still one group that can inadvertently open the gates to unwanted threat actors—your own people. Security must be second nature for your first line of defense For your organization to thrive, you need capable employees. After all, they're your source for great ideas, innovation, and ingenuity. However, they're also human. And humans are fallible. Hackers understand no one is perfect, and that's precisely what they seek to exploit. This is why your people must become your first line of defense against cyber threats. But to do so, they need to learn how to defend thems
National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w

National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w

Jun 01, 2011
National Democratic Party (NPD) of Germany hacked by n0-N4m3 Cr3w National Democratic Party (NPD) of Germany websites hacked by n0-N4m3 Cr3w hackers. List of hacked sites :  https://pastebin.com/3p5AwzZe  .  A message was displayed by hackers : First, a few words in advance. I am a proud German, I love Germany above everything, and I do everything in my power to improve the image of Germany. If the policy or the law this action on my part, prosecuted, my heart aches. Because if she does, all the great words of politicians are vain. Words such as: we will not allow that brings the NPD or the right wing of our children on the wrong track. We will do everything to the NPD or the Nazis to provide a stop. I know I'll come with my action on a broad public interest. That is exactly my goal. I want the Germans are proud of themselves and their country, on the history and achievements. The whole world envies us for our intelligence and knowledge. But ok, that is up to you. The NPD is to
Dating Funda Hacked over 1 lakh 45,000 user data hacked !
Wireshark 1.4.7 & Wireshark 1.2.17 Released

Wireshark 1.4.7 & Wireshark 1.2.17 Released

Jun 01, 2011
Wireshark 1.4.7 & Wireshark 1.2.17 Released Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education.This update fixes many bugs. Supports for the following protocols have been updated – BSSMAP, DMP, GSM SMS, LDSS, NCP, PN/IO, PPP, SIP, SNMP. Download here
Cybersecurity
Expert Insights
Cybersecurity Resources