#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

British spy agency has secret access to Global Internet and telephones

British spy agency has secret access to Global Internet and telephones

Jun 25, 2013
The Britain's spy agency GCHQ is running an online eavesdropping operation that has gained secret access to more than 200 optical fiber cables carrying global Internet traffic and telephone calls. The existence of the program has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called the largest program of suspicion less surveillance in human history. Dubbed as , Operation Tempora has been running for around 18 months and allows GCHQ to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days. GCHQ is also sharing this sensitive personal information with its American partner, the National Security Agency (NSA). The paper said GCHQ is tapping 200 internet links in total, each with a data rate of 10Gbps, with the agency having the technical capacity to concurrently analyze 46 of these 200 streams of data at a time. That access could
Google added malicious apps scanner to Chrome Web Store

Google added malicious apps scanner to Chrome Web Store

Jun 24, 2013
Over the past few years, Cyber Criminals have choose the official Google Chrome Web Store to push malware. In a recent announcement by Google, like Google Play Android apps store, all new apps uploaded to the Chrome Web Store will now also be automatically scanned for malware. Also, Google warned developers that it may take a little longer than before for their app to go live in the store, and  scanning may take from just a few minutes up to an hour.  " Starting today in the Chrome Web Store, you might notice that your item is not broadly available immediately after you publish it. " It is always against the Chrome Web Store Content Policies to distribute malware, if developer still wants to upload something malicious, they should cancel the process and withdraw their program. " This new functionality does not require any action on the part of developers. When you publish an item in the store, the developer dashboard will indicate that your item is i
10 Critical Endpoint Security Tips You Should Know

10 Critical Endpoint Security Tips You Should Know

Apr 26, 2024Endpoint Security / IT Security
In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business's digital kingdom. And because of this, endpoints are one of hackers' favorite targets.  According to the IDC,  70% of successful breaches start at the endpoint . Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT teams needing to protect more endpoints—and more kinds of endpoints—than ever before, that perimeter has become more challenging to defend. You need to improve your endpoint security, but where do you start? That's where this guide comes in.  We've curated the top 10 must-know endpoint security tips that every IT and security professional should have in their arsenal. From identifying entry points to implementing EDR solutions, we'll dive into the insights you need to defend your endpoints with confidence.  1. Know Thy Endpoints: Identifying and Understanding Your Entry Points Understanding your network's
California issued cease and desist order against Bitcoin Foundation

California issued cease and desist order against Bitcoin Foundation

Jun 24, 2013
The Bitcoin Foundation has received a cease-and-desist letter from the California Department of Financial Institutions, which oversees banks, credit unions, and other financial organizations operating in the state. Jon Matonis, who is a board member at the Foundation, revealed the letter on Forbes. The agency charges Bitcoin Foundation with allegedly " engaging in the business of money transmission without a license or proper authorization ." If they found to be in violation of the California Financial Code, the foundation could be fined up to $2,500 a day per violation, in addition to criminal prosecution. Convictions under the federal statute are punishable by up to 5 years in prison and a $250,000 fine. Bitcoin doesn't have any kind of central regulatory authority, and trading takes place through Mt. Gox or other exchange floors. So, California's decision to send a money transmitter warning to the Bitcoin Foundation is a Washington, D.C., nonprofit, makes no sense
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Facebook hack exposes contact Information of 6 Million Users

Facebook hack exposes contact Information of 6 Million Users

Jun 23, 2013
Facebook is alerting its users about a security breach due to a technical glitch, that may have inadvertently exposed the email addresses and telephone numbers of roughly 6 million users. " We recently received a report to our White Hat program regarding a bug that may have allowed some of a person's contact information (email or phone number) to be accessed by people who either had some contact information about that person or some connection to them, " Facebook said in its announcement. The problem stemmed from a tool that allows users to upload their contact lists or address books to Facebook so that the social network can serve up friend recommendations or invite people to join Facebook. " Because of the bug, some of the information used to make friend recommendations and reduce the number of invitations we send was inadvertently stored in association with people's contact information as part of their account on Facebook, " As a result,
Whistleblower Edward Snowden arrives in Moscow with the help of Wikileaks

Whistleblower Edward Snowden arrives in Moscow with the help of Wikileaks

Jun 23, 2013
Edward Snowden , The Whistleblower who revealed the existence of a secret US online surveillance program left Hong Kong and has landed at Moscow's Sheremetyevo airport with help of Wikileaks . WikiLeaks said in a statement that its legal adviser Sarah Harrison was on the plane with Mr Snowden and they would help 'secure is safety' at his 'final destination'. Snowden will go down in history as one of the most prolific whistleblowers . Snowden left Hong Kong after The White House asked the autonomous Chinese territory to extradite him. A senior administration official warned that if Hong Kong did not act quickly it would complicate relations. He had earlier been charged in the US with espionage. Snowden, who has been in hiding in Hong Kong for several weeks since he revealed information on the highly classified spy programs, has talked of seeking asylum in Iceland. He got an on SU 213 Aeroflot flight from Chep Lap Kok airport at 11.04am today (Hong K
Secret warrant forced Google to hand over WikiLeaks Volunteer’s Data to Feds

Secret warrant forced Google to hand over WikiLeaks Volunteer's Data to Feds

Jun 22, 2013
According to the court records released this week on web, The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteers in Iceland. Smari McCarthy and Herbert Snorrason , are the two Icelandic freedom of information activists, who managed the secure chat rooms of WikiLeaks in 2010, and that is the reason the government demanded his records from Google. According to the documents, Google was told by the Justice Department that they were prohibited from disclosing to either Snorrason or McCarthy any information about the investigation until indicated. But later last week, US. District Court Judge issued an order allowing Google to notify Snorrason about the warrant and to provided a redacted copy of the warrant.  The search warrant was issued under seal on October 14, 2011 by the Alexandria, Virginia federal judge overseeing the WikiLeaks grand jury investigation there. Snorrason says he rece
Megaupload files deleted by Dutch hosting company LeaseWeb

Megaupload files deleted by Dutch hosting company LeaseWeb

Jun 20, 2013
Kim Dotcom today said on Twitter that Megaupload user data in Europe has been irreversibly lost because it was deleted by a Dutch hosting company called LeaseWeb.  LeaseWeb is based in Germany and has subsidiaries also in the United States, the company.  LeaseWeb has 60,000 servers under its management and more than 15,000 clients worldwide. " The greatest massacre data of history ", The news is shocking if we consider the wealth of information contained in the files.  Leaseweb has informed Kim Dotcom that all 630 servers they rented have been wiped clean. This means that petabytes of data belonging to Megaupload users is now gone without any notice. LeaseWeb responds to Kim Dotcom " When Megaupload was taken offline, 60 servers owned by MegaUpload were directly confiscated by the FIOD and transported to the US. Next to that, MegaUpload still had 630 rented dedicated servers with LeaseWeb. For clarity, these servers were not owned by MegaUpload, t
Facebook temporarily blocked access from TOR, but not Intentionally

Facebook temporarily blocked access from TOR, but not Intentionally

Jun 20, 2013
Tor has become a tool of free expression in parts of the world where citizens can not speak freely against their government. On Tuesday, a number of users have noticed that Facebook is blocking connections from the Tor network. Tor is a free tool that keeps Web browsing sessions private and anonymous . For activists and political dissidents who use the Internet to communicate with the outside world in countries where doing so is a crime , being unable to login to Facebook using TOR posed a huge problem. Later, Facebook resolves the Tor issues and said that A high volume of malicious activity across Tor exit nodes triggered Facebook's automated malware detection system, which temporarily blocked visitors who use the Tor anonymity service to access the social network . The role that Tor and Facebook played in facilitating the dissemination of information under restrictive regimes cannot be underestimated. Security researchers are also frequent users of Tor, for instan
Cracking iPhone Hotspot password in 50 Seconds

Cracking iPhone Hotspot password in 50 Seconds

Jun 20, 2013
The ability to turn your iPhone into a Wi-Fi hotspot is a fantastically useful little tool in and of itself. When setting up a personal hotspot on their iPad or iPhone, users have the option of allowing iOS to automatically generate a password. According to a new study by Researchers at the University of Erlangen in Germany, iOS-generated passwords use a very specific formula one which the experienced hacker can crack in less than a minute. Using an iOS app written in Apple's own Xcode programming environment, the team set to work analyzing the words that Apple uses to generate its security keys . Apple's hotspot uses a standard WPA2 -type process, which includes the creation and passing of pre-shared keys (PSK). They found that the default passwords are made up of a combination of a short dictionary words followed by a series of random numbers and this method actually leaves them vulnerable to  brute force attack . The word list Apple uses contains approximately 52,500
Pirate Bay Founder Gottfrid Svartholm sentenced to 2 years in Sweden

Pirate Bay Founder Gottfrid Svartholm sentenced to 2 years in Sweden

Jun 20, 2013
The Pirate Bay co-founder Gottfrid Svartholm Warg was sentenced to two years in jail by Nacka district court, Sweden on Thursday for hacking into computers at a company that manages data for Swedish authorities and making illegal online money transfers. In Sweden, He is also involved in another case, to have hacked the mainframe of the CSC computer company protecting Rigspolitiet's (the Danish national police) IT system, as well as other sensitive government databases. In Denmark, Svartholm Warg and another unnamed Danish co-defendant were accused of illegally accessing 4 million files, including the email passwords of 10,000 policemen, personal identification numbers (CPRs) from a driver's license database and information about wanted persons in the Schengen region. He had denied the charges, further he can be extradited to Denmark to face charges for one of the country's largest hacking attacks. Last year Gottfrid Svartholm Warg was extradited to Sweden from Camb
LinkedIn was not Hacked, suffered outage due to DNS issue

LinkedIn was not Hacked, suffered outage due to DNS issue

Jun 20, 2013
The LinkedIn became inaccessible for an hour last night. Few Hours before App.net co-founder Bryan Berg posted that LinkedIn DNS was hijacked but later LinkedIn confirmed that they suffered outage due to DNS issue, not Hack. DNS Hijacking is an unauthorized modification of a DNS server or change of DNS address that directs users attempting to access a web page to a different web page that looks the same, but contains extra content such as advertisements, is a competitor page, a malware page, or third-party search page. Bryan said," all of your traffic has been sent to a network hosted by this company [confluence-networks.com]. And they don't require SSL, so if you tried to visit, your browser sent your long-lived session cookies in plaintext ." LinkedIn tweeted " Our site is now recovering for some members. We determined it was a DNS issue, we're continuing to work on it. Thanks for your patience, " but provided no further details. LinkedIn DNS hacked
Edward Snowden asylum : Hong Kong, Ecuador and Iceland

Edward Snowden asylum : Hong Kong, Ecuador and Iceland

Jun 19, 2013
Edward Snowden , an American former contractor for the National Security Agency (NSA), came forward as the whistle-blower in one of the biggest internal leaks in U.S. intelligence history now seeking asylum According to the United Nations High Commissioner for Refugees, Snowden would not be given preferential treatment if he were to apply for asylum in Hong Kong .  He seems to have complete and total trust in the Hong Kong political and judiciary system:  "Hong Kong has a strong tradition of free speech. People think China, Great Firewall … but the people of Hong Kong have a long tradition of protesting on the streets, making their views known … and I believe the Hong Kong government is actually independent in relation to a lot of other leading Western governments. " Snowden is currently hiding out in Hong Kong as the U.S. government pursues a criminal investigation into his actions. Because Hong Kong 's currently flawed system had no asylum screen
Expert Insights
Cybersecurity Resources