#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Hacker Confirms PlayStation 4 Jailbreak! Exploit Could Open Doors for Pirated Games

Hacker Confirms PlayStation 4 Jailbreak! Exploit Could Open Doors for Pirated Games

Dec 14, 2015
Sony's PlayStation 4 – the hottest-selling gaming console in the United States – has been in the market for a while now, and since its release, hackers have been tinkering with it to find a way to run unauthorized software. Though breaking the protection on PlayStation 4 is a huge deal, a hacker who calls himself CTurt has claimed to develop a fully jailbroken version of the PlayStation 4 with the help of a kernel exploit that he previously created. The current jailbreak allows dumping of the system RAM from other processes and installing custom firmware that can be used to run homebrew applications that aren't approved by Sony. Of course, there is still a few other security issues to get by, but it is a foot in the door for game piracy, which can affect the gaming market as a whole. The Twitter account of CTurt seems to indicate that currently the exploit only works for PlayStation 4 firmware version 1.76, but apparently it can be tweaked to work for mor
This is How Tokyo Police Catching Rogue Drones in the Sky

This is How Tokyo Police Catching Rogue Drones in the Sky

Dec 14, 2015
So how do you catch rogue drones that take your sky? With another Giant Drone, of course! This is exactly how the Tokyo Metropolitan Police Department is catching unwanted and potentially dangerous drones flying over the city, according to Japan Today. The department is launching an anti-drone squad in order to prevent people from flying their drones overcrowded residential areas and important buildings in Tokyo, including the Prime Minister's Office. How So? Instead using a dragnet on the ground, the police authorities will use a drone armed with a net to scoop up the suspected drones and carry them away to safety. Watch the Video: The Tokyo Metropolitan Police have also released a video that shows its special Net-Wielding Drone in action. You can look at the video above. It looks like the police are using a DJI Spreading Wings 900 with a 3 x 2 m² of Net tied to its feet. As soon as a rogue drone is spotted in the sky, the squad will first a
Pentera's 2024 Report Reveals Hundreds of Security Events per Week

Pentera's 2024 Report Reveals Hundreds of Security Events per Week

Apr 22, 2024Red Team / Pentesting
Over the past two years, a shocking  51% of organizations surveyed in a leading industry report have been compromised by a cyberattack.  Yes, over half.  And this, in a world where enterprises deploy  an average of 53 different security solutions  to safeguard their digital domain.  Alarming? Absolutely. A recent survey of CISOs and CIOs, commissioned by Pentera and conducted by Global Surveyz Research, offers a quantifiable glimpse into this evolving battlefield, revealing a stark contrast between the growing risks and the tightening budget constraints under which cybersecurity professionals operate. With this report, Pentera has once again taken a magnifying glass to the state of pentesting to release its annual report about today's pentesting practices. Engaging with 450 security executives from North America, LATAM, APAC, and EMEA—all in VP or C-level positions at organizations with over 1,000 employees—the report paints a current picture of modern security validation prac
Anonymous Declares War On Donald Trump — #OpTrump

Anonymous Declares War On Donald Trump — #OpTrump

Dec 12, 2015
After targeting the Islamic State (ISIS) group in the wake of Deadly terror attacks in Paris, hacktivist group Anonymous has now turned its attention to controversial US presidential candidate Donald Trump . The hacktivist group has declared war against Donald Trump following his recent radical speech stating he wanted to ban Muslims from entering the United States. Anonymous vs. Donald Trump On Wednesday, Anonymous slams Trump by posting a YouTube video in which a man in a Guy Fawkes mask says: "Donald Trump, it has come to our attention that you wish to ban all muslims from entering the United States. Muslims and Islam are not the problem. This policy will have grave impact and will serve only to fuel the emotions that ISIS uses to recruit muslims. Certainly ISIS will use this to their advantage in their social media campaigns. Instead of focusing on the innocent, the focus should be set on ways to protect them from the radicalized individuals they flee. Dona
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Hacker-Friendly Search Engine that Lists Every Internet-Connected Device

Hacker-Friendly Search Engine that Lists Every Internet-Connected Device

Dec 11, 2015
Meet an all-new Hacker's Search Engine similar to Shodan – Censys . At the end of last month, security researchers from SEC Consult found that the lazy manufacturers of home routers and Internet of Things (IoT) devices have been re-using the same set of hard-coded cryptographic keys , leaving around 3 millions of IoT devices open to mass hijacking. But how did the researchers get this number? Researchers uncovered these devices with the help of Censys – a new search engine that daily scans the whole Internet for all the vulnerable devices. Censys Maintains Complete Database of Everything on The Internet Censys is similar to hacker's search engine Shodan , which is designed specifically to locate any devices that have been carelessly plugged into the Internet without much attempt at preventing unauthorized access. However, Censys employs a more advanced method to find vulnerabilities in the devices and make the Internet a safer place. Censys is a fre
Government Could Hack Children's Toys to Spy on You

Government Could Hack Children's Toys to Spy on You

Dec 11, 2015
Smartphones, Smart TVs, Smart Watches, Cell Phone Towers, Messaging services… but now, What's Next? Smart Toys? Yes, probably. Tech expert is warning that 'Smart Toys' could now be used by the government intelligence agencies to spy on suspects. As part of the Investigatory Powers Bill , children's connected toys could be the next item to be used by the government in an effort to spy on people, claims Antony Walker, deputy CEO of technology trade association techUK. The Snooper's Charter – Government's Spy Eyes While speaking to the UK parliament's Commons Science and Technology Committee, Walker warned MPs of how the Draft Investigatory Powers Bill could be abused to turn any Internet-connected device into a snooping tool. The draft Investigatory Powers Bill (or the Snooper's Charter ) would make it the legal duty of Internet service providers (ISPs) to help and assist the British intelligence agencies in hacking into various connected devices if
France will not Ban Public Wi-Fi Or Tor Network, Prime Minister Valls Confirms

France will not Ban Public Wi-Fi Or Tor Network, Prime Minister Valls Confirms

Dec 11, 2015
Despite the French Ministry of Interior's demands, France will not ban the TOR anonymity network or Free public Wi-Fi as a way to help the law enforcement fight terrorism. French Prime Minister Manual Valls has gone on record saying that a ban on Free public Wi-Fi is " not a course of action envisaged ," and he is not in favor of banning the TOR anonymity network, either. Following the deadly terror attacks on Paris last month, an internal document obtained by Le Monde indicated that French government wanted to block communications of TOR as well as ban the use of Free Public Wi-Fi during states of emergency in an effort to fight terrorism more efficiently. However, according to France PM, banning Encrypted Communications could affect the country's economy and security. Must Read:  FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption TOR and Free Wi-Fi Safe in France, PM Says  " A ban of [free public] W
FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption

FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption

Dec 10, 2015
FBI declared War against Encryption. Encryption is defeating government intelligence agencies to detect terrorist activities and after the recent ISIS-linked terror attacks in Paris and California, the issue has once again become a political target in Washington. ...and meanwhile, Kazakhstan plans to make it Mandatory for its Citizens to Install Internet Backdoor , allowing the government to intercept users' traffic to any secure website and access everything from web browsing history to usernames and passwords. FBI: For God's Sake, Don't Use End-to-End Encryption At a Senate hearing on Wednesday, FBI's Director James Comey called for tech companies currently providing users with end-to-end encryption to reconsider "their business model" and simply stop doing that, reported The Intercept . Yes, instead of asking companies for a " backdoor " this time, Comey suggested them to adopt encryption techniques that help federal agencie
Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec

Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec

Dec 10, 2015
Someone just DDoSed one of the most critical organs of the Internet anatomy – The Internet's DNS Root Servers . Early last week, a flood of as many as 5 Million queries per second hit many of the Internet's DNS ( Domain Name System ) Root Servers that act as the authoritative reference for mapping domain names to IP addresses and are a total of 13 in numbers. The attack, commonly known as Distributed Denial of Service (DDoS) attack, took place on two separate occasions. The first DDoS attack to the Internet's backbone root servers launched on November 30 that lasted 160 minutes ( almost 3 hours ), and the second one started on December 1 that lasted almost an hour. Massive Attacks Knocked Many of the 13 Root Servers Offline The DDoS attack was able to knock 3 out of the 13 DNS root servers of the Internet offline for a couple of hours. Also Read:  Secure Email Service Paid Hackers $6000 Ransom to Stop DDoS Attacks . The request queries fired
It Works! Google's Quantum Computer is '100 Million Times Faster' than a PC

It Works! Google's Quantum Computer is '100 Million Times Faster' than a PC

Dec 09, 2015
Announcing the results of its experiment, Google says Quantum Computer is More than 100 Million times faster than a regular PC. Two years ago, Google and NASA ( National Aeronautics and Space Administration ) bought a D-Wave 2X quantum computer , which they have been experimenting at the U.S. space agency's Ames Research Center in Mountain View, California for the past two years. The goal is to create a better way to solve highly complex problems in seconds rather than years. Also Read:  Fastest Operating System for Quantum Computing Developed By Researchers Now, a Google's Quantum AI team appears to have announced the results of its latest test on D-Wave 2X quantum computer, demonstrating that quantum annealing can outperform simulated annealing by over 108 times – that is 100,000,000 times faster . What is  Quantum Computers? Quantum computers can theoretically be so much faster because they take advantage of quantum mechanics. While traditiona
Watch the World's First Mind-Controlled Car in Action

Watch the World's First Mind-Controlled Car in Action

Dec 09, 2015
When automobiles giant like Nissan, Toyota and Tesla are focusing on self-driving smart cars, Chinese researchers have taken the future of automotive car driving technology to the level that's beyond your imaginations. Chinese researchers have built what they claim is the World's First Mind-Controlled Car — that uses nothing but human's brain power to drive. Isn't that sound like a piece of some Sci-Fi movies? But it's true. World's First Mind-Controlled Car The team of researchers from Nankai University, in the north-east port city of Tianjin, has designed a brain signal-reading headgear instrument that allows a driver to: Drive forward Drive backwards Come to a Stop Both Lock and Unlock the vehicle ...all without using his/her hands or feet. The team has spent almost two years bringing the mind-controlled car to the reality. How Does the Mind-Controlled Car Work? Watch in Action Zhang Zhao , one of the project's r
Police Raid alleged Bitcoin Creator Craig Wright's Home in Sydney

Police Raid alleged Bitcoin Creator Craig Wright's Home in Sydney

Dec 09, 2015
Just hours after the Australian man ' Craig Steven Wright ' outed as the possible real identity of Satoshi Nakamoto , the anonymous creator of Bitcoin, Australian Police raided his home in Sydney. Over 10 police officers raided Wright's home in the Sydney suburbs on Wednesday afternoon. They forcefully opened the door, and 'started searching the cupboards and surfaces of the garage.' However, the Sydney police raid at Wright's home is not associated with the claims of his being involved in creating Bitcoins, rather related to the Australian Taxation Office investigation, the Guardian reported . Wright was recently identified as the mysterious creator of Bitcoin, based on leaked transcripts of legal interviews and a number of emails and blog posts. However, neither Dr. Wright nor anyone else has publicly confirmed the real identity of the founder of Bitcoin Satoshi Nakamoto. In a statement, the Australian Federal Police (AFP) officers said the raids weren
Bitcoin Creator 'Satoshi Nakamoto' Unmasked! An Australian Man 'Craig Wright' identified...

Bitcoin Creator 'Satoshi Nakamoto' Unmasked! An Australian Man 'Craig Wright' identified...

Dec 09, 2015
Breaking Update:   Police Raid alleged Bitcoin Creator Craig Wright's Home in Sydney . Yes, Satoshi Nakamoto , the mysterious creator of the Bitcoin digital cryptocurrency has possibly been identified as an Australian entrepreneur, according to investigations independently done by Wired and Gizmodo . His name is Craig Steven Wright … ...at least based on some convincing evidence shown by both the publications. Bitcoin is a revolutionary virtual currency developed around Blockchain , a complicated cryptographic protocol and a global computers network that oversees and verifies which Bitcoins have been spent by whom. The identity of the ones spending Bitcoins are extremely difficult to trace because of its anonymous nature, therefore, are very popular among criminals. Also Read:   Meet The World's First Person Who Hacked His Body to Implant a Bitcoin Payment CHIP Satoshi Nakamoto is not only the father of an entire economy worth Billions of dollars,
Cybersecurity Resources