#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Android Passwords are stored in plain text on Disk

Android Passwords are stored in plain text on Disk

Jul 23, 2011
Android Passwords are stored in plain text on Disk A Android user complain that , All passwords are stored in plane text on Disk via a message on discussion board of Android. He said " The password for email accounts is stored into the SQLite DB which in turn stores it on the phone's file system in plain text.Encrypting or at least transforming the password would be desirable. " On this Android Support "Andy Stadler" Reply that : Hello- Thanks for the information and the feedback on this concern. First, I would like to reiterate the notes made by a couple of you, which is to remind users that if you are concerned about this issue, *please* simply click the star. Every time you respond "please fix" or "should be fixed!" it sends email to over 200 people. Second, please know that we take information security very seriously, and this is baked into the Android platform at multiple levels. Now, with respect to this particular
Apple MacBooks Can Be Hacked Through The Battery

Apple MacBooks Can Be Hacked Through The Battery

Jul 23, 2011
Apple MacBooks Can Be Hacked Through The Battery Security researcher Charlie Miller is quite well known for his works on Apple products. Today he has come up with a very interesting way to hack the MacBook using the battery. Laptop battery contains its own monitoring circuit which reports the status of the battery to the OS. It also ensure that the battery does not overcharge even when the laptop is turned off. Miller has discovered that on the MacBooks, the batteries are shipped with the default password set on the chips. It means that if someone knows the default password, the firmware of the battery can be controlled to do many things from simply ruining the battery to installing a malware which reinstalls whenever the OS boots. Miller said that it might even be possible to overload the battery so that it catches fire. This is what Miller said: These batteries just aren't designed with the idea that people will mess with them. What I'm showing is that it's possible to use the
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Pakcyberarmy database hacked and Leaked by Indian Hacker - Lucky

Pakcyberarmy database hacked and Leaked by Indian Hacker - Lucky

Jul 23, 2011
Pakcyberarmy database hacked and Leaked by Indian Hacker - Lucky Indian Hacker - Lucky (Indishell) crack the 1500+ user's passwords from Pakcyberarmy.net database.  Pakcyberarmy.net is the hub of most of the Pakistani hackers. Indian hacker group " Indishell " leader " Lucky "  leaks all info via a excel file available for download here . " Most of the Users/Hackers used the same passwords to their emails and what ever u wanna do do it spam, play , abuse or what ever you feel like its all yours " According to Lucky. The password List is available : https://www.multiupload.com/ERWJ33UPI2 Archive password - proud_to_be_indian Format - HASH : PASSWORD
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Linux 3.0 Kernel Released - Download

Linux 3.0 Kernel Released - Download

Jul 22, 2011
Linux 3.0 Kernel Released - Download A recent Google+ Post by Linus Torvalds indicates that version 3.0 of the Linux kernel will have to wait due to the discovery of a 'subtle pathname lookup bug.' Linus indicates, 'We have a patch, we understand the problem, and it looks ObviouslyCorrect(tm), but I don't think I want to release 3.0 just a couple of hours after applying it. Officially marking the introduction of Linux 3.x, Linus Torvalds this evening announced the official release of Linux 3.0. The Linux 3.0 kernel would have been released as the Linux 2.6.40 kernel, until the developers decided to end the 2.6 series and move forward with the 3.x series. This Phoronix posting details some of the Linux 3.0 features, including file-system Cleancache support, initial Intel Ivy Bridge support, better open-source kernel graphics drivers, and many other hardware driver enhancements. " So there it is. Gone are the 2.6. days, and 3.0 is out. " Now it's
8 Court Cases against Sarah Palin Leaked By TeaMp0isoN

8 Court Cases against Sarah Palin Leaked By TeaMp0isoN

Jul 21, 2011
8 Court Cases against Sarah Palin Leaked By TeaMp0isoN TeaMp0isoN Hackers leaks today the 8 Court Cases against Sarah Palin. The Documents are Leaked via MediaFire Link. The Archive contain Following Files, as shown.  There are 8 total Court cases , which are against Sarah Palin.
Jouve Group hacked by Inj3ct0r Team Against The Nato

Jouve Group hacked by Inj3ct0r Team Against The Nato

Jul 21, 2011
Jouve Group hacked by Inj3ct0r Team Against The Nato Inj3ct0r Hackers Hacked the Jouve group websites and Upload there data at Sendspace Link . Message By hackers " For the Pride of Green LibyaAnd Supporting the Libyan Nation Against The Nato GangsWe are against terrorism and violence in Libya! Nato hacked " - Source . Hacked Domains are  https://www.jouve.com/ , https://www.jouve-germany.de/ & https://www.jouve.fr/ . Mirror Links are :  https://www.zone-h.com/mirror/id/14453765 & https://www.zone-h.com/mirror/id/14453766  . The main motive of these hacks according to Inj3ct0r Hackers " We are against nuclear weapons and terrorism ". There are 883 files in archive , It contains the site backup almost , as shown.
Expert Insights
Cybersecurity Resources