уторак, 31. јануар 2012.

CVE-2012-0056 Linux privilege escalation [Video Demonstration]

", ckw: "Downloads,Hacker News,News,Tools", pub: "Sunday, January 29, 2012", url: "http://thehackernews.com/2012/01/cve-2012-0056-linux-privilege.html"

View the Original article

Zulu - Zscaler Malware Scanning Service

", ckw: "GENERAL NEWS,Hacker News,News,Security News", pub: "Sunday, January 29, 2012", url: "http://thehackernews.com/2012/01/zulu-zscaler-malware-scanning-service.html"

View the Original article

Universal Music Portugal database dumped by Hackers

", ckw: "Anonymous Hackers,Defacements,Hacker News,News", pub: "Sunday, January 29, 2012", url: "http://thehackernews.com/2012/01/universal-music-portugal-database.html"

View the Original article

Another Malware from Android Market infect Millions of Users

", ckw: "Hacker News,News,Security News,Vulnerability", pub: "Sunday, January 29, 2012", url: "http://thehackernews.com/2012/01/another-malware-from-android-market.html"

View the Original article

FBI will Monitor Social Media using Crawl Application

", ckw: "Hacker News,News,Security News", pub: "Sunday, January 29, 2012", url: "http://thehackernews.com/2012/01/fbi-will-monitor-social-media-using.html"

View the Original article

Embassy of Kazakhstan hacked by Anonymous Supporters

", ckw: "Defacements,Hacker News,Indian Hackers,News,Vulnerability", pub: "Monday, January 30, 2012", url: "http://thehackernews.com/2012/01/embassy-of-kazakhstan-hacked-by.html"

View the Original article

Ani-Shell v1.5 (Final) Released

", ckw: "Downloads,Hacker News,Indian Hackers,Tools", pub: "Tuesday, January 31, 2012", url: "http://thehackernews.com/2012/01/ani-shell-v15-final-released.html"

View the Original article

Data encryption : PrivateSky Secure Information Exchange platform

", ckw: "News,Security News,Technology News", pub: "Tuesday, January 31, 2012", url: "http://thehackernews.com/2012/01/data-encryption-privatesky-secure.html"

View the Original article

петак, 27. јануар 2012.

Panasonic China website hacked and Redirected

", ckw: "Defacements,Hacker News,News", pub: "Tuesday, January 24, 2012", url: "http://thehackernews.com/2012/01/panasonic-china-websites-hacked-and.html"

View the Original article

Phishing Google Users with the Help of Google !

", ckw: "Downloads,Hacker News,Indian Hackers,News,Tools,Vulnerability", pub: "Tuesday, January 24, 2012", url: "http://thehackernews.com/2012/01/phishing-google-users-with-help-of.html"

View the Original article

Android Network Toolkit (ANTI) Review - Pentest at the push of a button

", ckw: "Downloads,Hacker News,News,Security News,Technology News,Tools", pub: "Tuesday, January 24, 2012", url: "http://thehackernews.com/2012/01/android-network-toolkit-anti-review.html"

View the Original article

Tor Vulnerable to Remote arbitrary code Execution

", ckw: "Hacker News,News,Security News,Vulnerability", pub: "Tuesday, January 24, 2012", url: "http://thehackernews.com/2012/01/tor-vulnerable-to-remote-arbitrary-code.html"

View the Original article

Fake CNBC's Website for Internet Fraud

", ckw: "Cyber Crime,Hacker News,News,Security News", pub: "Friday, January 27, 2012", url: "http://thehackernews.com/2012/01/fake-cnbcs-website-for-internet-fraud.html"

View the Original article

Hcon’s Security Testing Framework (Hcon STF) v0.4 [Fire base]



Hcon respects & salutes to all of the freedom fighters of India, without whom we can never be able get our freedom.A tribute to all of the freedom fighters of all the countries we present HconSTF version 0.4 codename ‘Freedom’.Hope this year brings freedom for everyone on the internet form different governments & companies which are making the internet users their slaves.For this purpose HconSTF 0.4 has integrated many functions for anonymity and OSINT.
Some Highlight Features :Categorized and comprehensive toolsetContains hundreds of  tools and features and script for different tasks like SQLi,XSS,Dorks,OSINT to name a fewHconSTF webUI with online tools (same as the Aqua base version of HconSTF)Each and every option is configured for penetration testing and Vulnerability assessmentsSpecially configured and enhanced for gaining easy & solid anonymityWorks for web app testing assessments specially for owasp top 10Easy to use & collaborative Operating System like interfaceLight on Hardware ResourcesPortable - no need to install, can work from any USB storage deviceMulti-Language support (feature in heavy development translators needed)Works side-by-side with your normal web browser without any conflict issuesWorks on both architectures x86 & x64 on windows XP, Vista, 7 (works with ubuntu linux using wine)Netbook compatible - User interface is designed for using framework on small screen sizesFree & Open source and always will beCategories of tools :Information gathering / AnalysisEditors / DebuggersExploitation / AuditingAnonymityPasswordsCryptographyDatabaseScripting / AutomationNetwork UtilitiesReporting
License :        MPL,GPL,LGPL .  in simple words its free as speech , no license fees.


Download Hcon STF v0.4
☛ Let us know what you think, learn, and hope for! Connect With us on Google

View the Original article

Cross Site Scripting (XSS) Vulnerability in Google

", ckw: "Hacker News,News,Vulnerability", pub: "Friday, January 27, 2012", url: "http://thehackernews.com/2012/01/cross-site-scripting-xss-vulnerability.html"

View the Original article

Video Conferencing Systems Vulnerable To Hackers

", ckw: "Hacker News,News,Security News", pub: "Friday, January 27, 2012", url: "http://thehackernews.com/2012/01/video-conferencing-systems-vulnerable.html"

View the Original article

четвртак, 12. јануар 2012.

Warm up the keyboard, Its time for February The Hacker News Magazine !




Warm up the keyboard, hack into the internet security of your mind and help us fill the February The Hacker News Magazine with fun, interesting and educational web security info.
Our readers love to see what you are up to and what the industry is creating and manufacturing for anyone who turns on their computer and wonders if today is the day they will be hacked into cyber space! Mostly, what they can do about it and how they can protect themselves.

Topics of interest include, but are not limited to the following:
- New Attack and Defense Techniques
- Vulnerability discovery
- Small Tactics & Techniques - Big Attacks & Impact
- Mobile Hacking
- Professional Exploit Development
- Security and Hacking Events Around The World
- Technical Book Reviews
- Security and Hacking Threats
- Play with Security Tools
- Expert Interview

We welcome contributions from readers and hackers like YOU! For additional information, including deadlines and guidelines for submissions, please contact us at: thehackernews

View the Original article

Self-extracting archive (SFX) as Creative Virus Handler



View the Original article

The Saudi hacker to Mossad "Don’t waste your time by searching for me"!

In a response to the Israeli hackers, the Saudi hacker xOmar exposed 200 Israeli credit cards and he described the Israeli hackers by idiots and he said that they published invalid credit cards.
And he asked Mossad through his website not to search for him, because they won't catch him. xOmar threatened the Israeli people by exposing 200 credit cards daily, and all of these credit cards are valid.
speaking about the latest efforts to locate his place, he said ''I've heard from some idiots saying that I am from Mexico, and another said that I am in Riyadh, and last one said that I am from Dubai" and he said to mossad in a message ''don't waste your time''
The Secretary-General of the Committee on Information and awareness of banking in Saudi banks ''Tal'at hafiz'' have told the "Arabiya.Net" yesterday that Saudi banks have now reviewed all of the data on the accounts declared by the Israeli hacker, and some of them published in the websites
He said that the Saudi banks have reviewed the accounts and found that these accounts do not belong to Saudi banks, but we must be careful when dealing with shops and commercial sites.
Complete Message by 0xOmar:Hi
Russian intelligence closed my mail.ru email, so I have created this one. 0xOmar

View the Original article

Self Claimed Hacker - Ankit Fadia Hacked by Young Hackers Again and Again !

", ckw: "Defacements,Hacker News,Indian Hackers,News", pub: "Friday, January 13, 2012", url: "http://thehackernews.com/2012/01/self-claimed-hacker-ankit-fadia-hacked.html"

View the Original article

Chinese hackers deploy Sykipot Trojan targeting smart card readers used by U.S

", ckw: "Hacker News,News,Security News", pub: "Friday, January 13, 2012", url: "http://thehackernews.com/2012/01/chinese-hackers-deploy-sykipot-trojan.html"

View the Original article

Microsoft launching Real Time Hosted Threat Intelligence Feed

", ckw: "Hacker News,News,Security News", pub: "Friday, January 13, 2012", url: "http://thehackernews.com/2012/01/microsoft-launching-real-time-hosted.html"

View the Original article

уторак, 10. јануар 2012.

Stratfor Back Online After Hack with message for Anonymous Hackers

", ckw: "Anonymous Hackers,Cyber Crime,Defacements,News", pub: "Thursday, January 12, 2012", url: "http://thehackernews.com/2012/01/stratfor-back-online-after-hack-with.html"

View the Original article

Homeland Security have eye on Journalists

", ckw: "Cyber Crime,Hacker News,News,Security News,Voice Of Hackers", pub: "Thursday, January 12, 2012", url: "http://thehackernews.com/2012/01/homeland-security-have-eye-on.html"

View the Original article

Your Android really needs Antivirus Security ?

background: -webkit-gradient(linear, left top, left bottom, from(#3b5998), to(#3b5998));;border:1px solid #1A2638;border-radius:10px; margin-bottom:10px;padding:10px;text-align:center;background: -moz-linear-gradient(top, #3b5998, #3b5998)

View the Original article

недеља, 8. јануар 2012.

International Conference on Cyber Security (ICCS) 2012 : Protecting the Cyber World

", ckw: "Cyber Crime,Hacker News,News,Security News", pub: "Monday, January 09, 2012", url: "http://thehackernews.com/2012/01/international-conference-on-cyber.html"

View the Original article

XSS vulnerability reported in Yahoo subdomain website

", ckw: "Hacker News,News,Vulnerability", pub: "Monday, January 09, 2012", url: "http://thehackernews.com/2012/01/xss-vulnerability-reported-in-yahoo.html"

View the Original article

субота, 7. јануар 2012.

M86 Security detected Web exploitation attacks using AJAX

", ckw: "Hacker News,News,Security News,Vulnerability", pub: "Sunday, January 08, 2012", url: "http://thehackernews.com/2012/01/m86-security-detected-web-exploitation.html"

View the Original article

Israel treating hackers like terrorists

", ckw: "Cyber Crime,Hacker News,News", pub: "Sunday, January 08, 2012", url: "http://thehackernews.com/2012/01/israel-treating-hackers-like-terrorists.html"

View the Original article

Wireless Penetration Testing Series Part 1: Getting Started with Monitoring and Injection

", ckw: "Ebook download,Hacker News,News,Security News,Tools,Wireless Penetration Testing Series", pub: "Sunday, January 08, 2012", url: "http://thehackernews.com/2012/01/wireless-penetration-testing-series.html"

View the Original article

петак, 6. јануар 2012.

From the In-Security Land to Security in the Cloud

", ckw: "Ebook download,Hacker News,Linux News,News,Security News", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/from-in-security-land-to-security-in.html"

View the Original article

HNNCast.2011.02.18

HNNCast for the third week of February, 2011

Top Story
Team Themis

News
Plenty of Breach, Stuxnet Attribution, Lush Breach Broader than Believed, Show Me THAT Money

T00l T1m3
updated: Vera, Fiddler, Dradis, Arachni, RAT, Nmap, Nessus
new: IronBee, PhoneyC, Mimic, SQueRT

Quickies
It’s the Chinese Eh, Dark Side of the Moon for Solo, /lib/keyboard, Recruiting Suckaz, One Too Many Clicks to BBC Six, WinAmp0wnage, Bad Days for Jewlers, Back to Basics Down Under, Back-peddling on AutoRun, Kingpin

Con Fu
pwn2own update, DC19 Cracking Contest, Sweet Paris

Stack of Shame
count: 58 (-7)
10 (-2) OVERDUE!  2/4/11 (-14):
ZDI-CAN-830 from Novell ( 239 days )
ZDI-CAN-767 from Microsoft ( 317 days )
ZDI-CAN-733 from Apple ( 332 days )
ZDI-CAN-713 from Sun Microsystems ( 342 days )
ZDI-CAN-691 from Apple ( 359 days )
ZDI-CAN-672 from Microsoft ( 380 days )
ZDI-CAN-244 from Borland ( 456 days )
ZDI-CAN-543 from Microsoft ( 560 days )
ZDI-CAN-533 from Microsoft ( 574 days )
ZDI-CAN-348 from RealNetworks ( 967 days )


 

One Response to ''

Subscribe to comments with RSS

HNNCast for the third week of February, 2011
//Top Story/
Team Themis
http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars
http://www.pcworld.com/businesscenter/article/219769/hacked_and_now_vandalized_hbgary_pulls_out_of_rsa.html
http://thinkprogress.org/2011/02/10/chamberleaks-target-families/
http://uk.news.yahoo.com/16/20110212/ttc-anonymous-hack-reveals-hbgary-plan-t-6315470.html
http://www.hbgary.com/statement.htm
http://www.wired.com/threatlevel/2011/02/spy/
http://publicintelligence.net/hbgary-team-themis-corporate-information-reconnaissance-cell-documents/

//News/
Plenty of Breach
http://krebsonsecurity.com/2011/02/eharmony-hacked/

Stuxnet Attribution
http://blogs.pcmag.com/securitywatch/2011/02/new_details_on_stuxnet_emerge.php
http://www.foxnews.com/scitech/2011/02/15/anonymous-hackers-offer-stuxnet-worm-online/
http://translate.google.com/translate?js

View the Original article

HNNCast.2011.02.25

HNNCast for the last week of February, 2011

Top Story
Two Minutes of Hate, Two Weeks of FUD, Too Long Behind Bars

News
HB Gary’s Fake Friends, Cenzic Can’t DO so they patent and SUE, We R All Up in Yer Musics

T00l T1m3
updated: Mod Security, Nikto, Seccubus, SAMHAIN, THICKNET, Autologon

new: Volatility, Splunk for OSSEC, NiX, inSSIDer

NetWitness Note

Quickies

Celebrity Twits: Kim Kardassian, BBC World News
Cyber Mumbo Jumbo, Cyber UL
Defacements: Voice of America, Avira
Med School Compromise, Dutch Banking DDoS, MFA No Panacea, ODDJOB, CyberFool Index, Patch Time

Con Fu
X’d CaliberCon, PST CFP, DC19 CFP

Stack of Shame

count: 54 (-4)

10 (-2) OVERDUE! ; 2/4/11 (-21):
>ZDI-CAN-830 Novell

View the Original article

HNNCast.2011.03.04

HNNCast for the first week of March, 2011
Top Stories
pwn2own a Week Away, Anonymous Ops Continue, Anonymous Fall-out Continues Too, It’s a Good Year NOT to be Greg Hoglund, Thanks OWASP

News
Androids Under Attack, Mac Malwares, Lion Seed, iTunes Struggle, It’s Unanimus – You’re Pwn3d

T00l T1m3
updates: Mobius, Wireshark, Nessus, Scapy, w3af, Armitage, FOCA, WATOBO, XSSer
Nessus in the Cloud, Naked Password

Quickies
Celebrity Twits, Turing Target Met, Wack-a-Quack, Underground Carder War, Weev Free, Every Browser can Tatanga, Cry Me a Digital River, Crippling Autorun, Team Kuwait Strikes Israeli Sites, Zynamics Acquired by Google

Con-Fu
DerbyCon Speakers, WOOT CFP, Source Coast-to-Coast, BruCon CFP, Notacon Not-acomodations, B-Sides Wrap-Up, Can Sec West NEXT WEEK!

Stack of Shame
The Stack of Slightly Less Shame
count: 92 (

View the Original article

HNNCast.2011.03.25

HNNCast for the third week of March, 2011
Top Stories
Under the Comodo, Recent Security Acquisition turns Incident, PHPwned, b107

News
j35t3r sets DoS Record, Smart-phone Security Sucks, DoS Flurry, Going Wayback with the Saltine

T00l T1m3
Updates: PacketFence, winAUTOPWN, SAMHAIN, JBROFuzz, Arachni, Fiddler, Burpsuite, Skipfish, Yara, THICKNET
Fresh: J-HAT/HPROF, GnackTrackR6, MOSCRACK, Creepy
Hardwarez: FUNcube
Note: MoonSols Utilities

Quickies
Celebrity Twits, Plans to Nix IE6, pwned and Poppin’, Vendor Insecurity List, SHA-3 Field Narrows to Five, Ghostmarket Guy Sentenced to Five, Student Snagged Changing Grades, InterWACK, Jumbo Hoax, Pr0n h4x0r Sentenced to Six Years, One H0t H4x0r Chick

Con Fu
Note: Tokyo Hacker-Space
CSW and PWN2OWN, OWASP AppSec USA CFP, Hack Lu CFP, Notacon, CCC 2011 is ON, Source Boston/BeaCon, Carolina Con, B-Sides World-Wide, the SF to DC19 Hack-Bus

Stack of Shame
count: 89 (

View the Original article

HNNCast.2011.04.01

HNNCast for the last week of March, 2011
Top Stories
Running SCAreDA, VIPRE AV Poisonous, Comodo Still Open, Hacked-In Networks’ InfoSpherix Opener

News
SeQueL to 13 Years of SQL Leaks, Congress Comes a Callin’, No Gitmo for MitMo, the WiFi Transmits for Free
CORRECTION: it’s ne0h, not neo4data; sorry to both.

T00l T1m3
upates: QuickRecon
new: WebScarab NG, Hatkit Proxy, yInjector, Data Block Analyzer, DDL Dump, Monocle
news: Stuxnet Internals, X-Code Pro-Tip, MOD Security Prevails

Quickies
Ghost Exodus CHROOTED, PHP in a Fog, Trip Advisor Breached, Virtual Chip Convict CHROOTED, When Security Software Attacks, Local File Phishing Flourishes, McAffee Safe for Hackers, OS 10:Virii 4, FBI Issues RL Cyber Sleuth Challenge, POOP LOLz

Con Fu
CCD Final 9, Tak3D0wn con Speakers, Dakota Con Speakers
B-Sides Roundup: LV Registration, CFP Rounds

Stack of Shame
count: 85 (-4)


 

One Response to ''

Subscribe to comments with RSS

Top Stories
Running SCAreDA
http://www.theregister.co.uk/2011/03/22/scada_exploits_released/
http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/229400104/us-cert-issues-warnings-on-vulnerabilities-in-siemens-other-scada-products.html

VIPRE AV Poisonous
http://www.f-secure.com/weblog/archives/00002133.html
http://www.networkworld.com/newsletters/sec/2011/032811sec2.html
http://www.samsungtomorrow.com/1071

Comodo Still Open
http://www.pcworld.com/businesscenter/article/223760/comodo_hacker_claims_another_certificate_authority.html
http://erratasec.blogspot.com/2011/03/interview-with-comodohacker.html
http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html
http://pastebin.com/CvGXyfiJ
http://pastebin.com/X8znzPWH
http://pastebin.com/kkPzzGKW
http://erratasec.blogspot.com/2011/03/interview-with-comodohacker.html

Hacked-In Networks’ InfoSpherix Opener
http://www.washingtonpost.com/officials-malware-may-have-exposed-credit-cards-used-for-state-park-pass-purchases-in-maine/2011/03/24/AB7OI2QB_story.html

News
SeQueL to 13 Years of SQL Leaks
http://www.thetechherald.com/article.php/201113/6976/Oracle-attacked-MySQL-and-Sun-caught-in-the-crossfire
http://www.theregister.co.uk/2011/03/31/lizamoon_mass_injection_attack/
http://community.websense.com/blogs/securitylabs/archive/2011/03/29/lizamoon-mass-injection-28000-urls-including-itunes.aspx
http://pastebin.com/raw.php?i

View the Original article

HNNCast.2011.04.08

HNNCast for the first week of April, 2011
Top Stories
Epsilon Anything But, AIM on Full Exposure, Remaining Silent About the risk, Lil Ole Lisa Moon

News
#1 Phish Phry, Anonymous Still Active, NASA’s Just Popped Labs, Breach of English, Inside Bad Guys

T00l T1m3
updates: THC-Hydra, Metasploit Pro and Express, Peach, Snort, Maltego, SET
new: OWASP ESAPI, WhisperCore, WhisperYAFFS
news: UIC Debugging List, Submit to the Vulnerability Database

Quickies
Euro-Cluelessness, Aussie Email Breach, brIEEEch, Gaming Breaches, Netopia Dystopia, Take it Easy on the FBI Guys

ConFu
C-C-Camping, Ninjacon Tix, Notacon Nota Bad Badge
B-Sides: Detroit CFP, Connecticut CFP, Rot-chester CFP, LV Registration, Chicago Sold-Out, London Sold-Out, Australia Added

Stack of Shame
count: 84 (-1)
Top Offender: Oracle


 

One Response to ''

Subscribe to comments with RSS

Top Stories
Epsilon
http://krebsonsecurity.com/2011/04/spammers-target-kroger-customers/
http://www.pcworld.com/businesscenter/article/224258/about_50_clients_hit_by_epsilon_email_marketing_breach.html
http://krebsonsecurity.com/2011/04/epsilon-breach-raises-specter-of-spear-phishing/
http://www.blackhatworld.com/blackhat-seo/email-marketing-opt-lists/294190-spammers-hack-into-supermarket-chains-krogers-database.html

AIM on Full Exposure
http://gawker.com/#!5787392

Remaining Silent About the risk
http://www.pitchengine.com/catechnologies/-ca-technologies-offers-rsa-securid-customers-opportunity-to-trade-their-rsa-tokens-for-ca-arcotid-secure-software-credential/135441/
http://www.informationweek.com/news/security/vulnerabilities/229400831

Lil Ole Lisa Moon
http://blogs.cisco.com/security/lizamoon-much-ado-about-very-little/

News
#1 Phish Phry
http://news.techworld.com/security/3267989/operation-phish-phry-criminals-face-up-to-30-years-in-jail/?olo

View the Original article

HNNCast.2011.04.15

HNNCast for the second week of April, 2010
Top Stories
WAFamatta University, Let Them Eat It, a Sober Segvec Ponders Position, UK SpyEye Bust

News
Month of Prior Art, Russia’s Cyber Woes, Hackerness is next to Godliness, Hyundai Held Hostage

T00l T1m3
new: iKeyGuard

Quickies
Governments Rush to Cover their Behinds, Delta Hacking Team Takes the Gulf, Black-Hole at the Post Office, Goatse Guilty Plea, Brit Banker Pigs Plunder da Pounds, Linksys Pwnage, Ducati Dumbness, mmm Deer Meet, Another Phat Tuesday

Con Fu
Community: SketchCow

View the Original article

HNNCast.2011.04.22

HNNCast for the first week of April, 2011
Top Stories
Breach-omattic, BigR and the FPL, RockYou Case Rocks On

News
Drop the B.S., Botnet Busters, Another Pathetic Transferrence, Week of Threat Briefs

T00lT1m3
updates: Wireshark, SandCat, Amap, Armitage, CVEchecker, QubesOS, Sys Internals, Olly Debug, Creepy, Maltego
new: RawCap, Streams, ViewStateHacker, DirectoryScanner, ShareScan, GetSploits, SQLmap, redsn0w, SpoofTooph
hardware: Fluke Air-Check

Quickies
TurboMessa, Ai Shitunot, WiFi Insecurity Conference, Key-through-12 Logging, CCDC Championship

ConFu
CanSecWest Media Posted, Hack.LU CFP, EkoParty Expanded
DefCon Wrap-Up: Pokercon, Scavenger Hunt Sponsors, SkyTalk CFP, Call for New Vendors

Stack of Shame
count: 146 (

View the Original article

HNNCast.2011.04.29

HNNCast for the last week of April, 2011
Top Stories
Sony’s Boner, Iran Seeing Stars, EFF Defeats Another Abuse

News
Epsilon Needs Hacker-B-Gone, All Your Bugs R Belong 2 Microsoft, YOU

View the Original article

HNNCast.2011.05.06

HNNCast for the first week of May, 2011
Top Stories
sOny, AnonOps, Malware Goes Mac

News
Research Fought the Law, Cruiser Cam Configs, Rent to Pwn, solo-ng

ToolTime
Updates: Hydra, MosCrack, JTR, NCrack, SAMHAIN, Seccubus, MOD Security, ARPon, PacketFence, SysInternals, JQuery, Java, BackBox Linux, OpenBSD, Metasploit, WhisperCore
New: AntiXSS for ASP.NET, PHP Vulnerability Hunter, Malware Analyzer, NeXpose Ruby API, SQL Dumper

Quickies
Celebrity Twitts, Rabobank Down, CybaTerminators, Best Breach, I Love You, Phreaking Not Dead, NCIJT Under-powered, Grade Changing Games

ConFu
BruCon Venue Change, Source Conference Round-up, SecTOR CFP, to LayerOne in LA, No Sleep Til Brooklyn, dEFFcon Getaway Contest

Stack of Shame
count: 135 (unch)
Top Offender: Adobe (25)


 

One Response to ''

Subscribe to comments with RSS

HNNCast for the first week of May, 2011
Top Stories
sOny
http://exophase.com/22720/sony-to-restore-psn-access-this-week-will-reward-users-with-free-content-and-ps-plus-subscription/
http://www.engadget.com/2011/05/01/sonys-kaz-hirai-will-address-playstation-network-hack-at-1am-et/
http://blog.us.playstation.com/2011/05/02/playstation-network-security-update/
http://www.soe.com/securityupdate/
http://www.hollywoodreporter.com/news/sony-online-entertainment-slashes-hundreds-173638
http://graphics8.nytimes.com/packages/pdf/technology/20110504-sony-letter.pdf
http://www.theregister.co.uk/2011/05/04/sony_implicates_anonymous/
http://onlinegamernews.net/content/sony-intrusion-route-system-diagram
http://www.scmagazineuk.com/anonymous-hits-back-at-sonys-claims-about-its-part-in-the-playstation-breach/article/202151/

AnonOps
http://anonnews.org/

Malware Goes Mac
http://www.csis.dk/en/csis/blog/3195/
http://threatpost.com/en_us/blogs/crimeware-kit-emerges-mac-os-x-050211
http://www.youtube.com/watch?v

View the Original article

HNNCast.2011.05.13

HNNCast for the second week of May, 2011
Top Stories
A Sony Excuse for Security, Anonymous Discontent, They Call Me Dr. Suck, EFF the FBI, Perilous Pin Pads

News
He Who Smelt It

View the Original article

HNNCast.2011.05.20

HNNCast for the third week of May, 2011
Top Stories
Sony to Say but Sony Again, Joo Id-Eidos, Sonne Sees the Sunlight, Macin Malwarez

News
Down Under the B-Side, the Land with a Plan, Unemployed Identities Stolen, Le Pirate Genarale, Phreaking the Phuture

T00lT1m3
updates: Metasploit, Skipfish, NessusDB, OpenDLP, NetSparker, EMET, Sys Internals: VMMap, RAMMap, Handle, and Process Explorer
new: nuf-fuzzer for Browsers, safe3 SQL Injector, MalBox Analysis System, Pytbul IDS Tester, YETI Network Identity Scanner, Cuckoo Malware Analysis Sandbox, DOMinator JavaScript Scanner, rcat is Netcat

Quickies
Shame on the VA, India Cyber Army, More Ghost Market Sentences, Geek dot Com not So, Tinkode Hits NASA, the Pleasure of Malware, Op U-F-LOL, M&A News

ConFu
GrrCon CFP, RuxCon 2011 CFP, PhreakNic 15 Date
DefCon Roundup: SkyTalks CFP, Wall of Sheep Sponsorship, Badges

Stack of Shame
count: 124 (-1)
Top Offender: Adobe


 

One Response to ''

Subscribe to comments with RSS

URLS
HNNCast for the third week of May, 2011
Top Stories
Sony to Say but Sony Again
http://smarthouse.com.au/Gaming/Online/M2X4T2M2
http://sanfrancisco.ibtimes.com/articles/148029/20110518/sony-play-station-network-password.htm

Joo Id-Eidos
http://krebsonsecurity.com/2011/05/anonymous-splinter-group-implicated-in-game-company-hack/
http://www.wired.com/gamelife/2011/05/eidos-hacked/

Sonne Sees the Sunlight
http://www.thestar.com/news/article/993296–g20-accused-byron-sonne-finally-released-on-bail
http://www.youtube.com/watch?v

View the Original article

HNNCast.2011.06.03

HNNCast for the first week of June, 2011
Top Stories
All Your Base Are Belong To Lulzsec, Rewind to RSA, It’s Those Damned Mongolians Again, Faux News About Fox News?

News
Cyber Cold War Roll-Call, Google’s Open Market, Welcome to the Real World Stevie Joby Jobs, Postcards for Solo

Quickies
Celebrity Twits: He Said Wiener, Hell’s Inbox
Honda Canada Breach, Facebook Bug Bounty, Not Called to Duty, Blame the “Victim” Finally, I <3 Open Comodos, LOL Dox, Norway Pays Attention for a Day

Con Fu
Source Boston 2012, Black Hat Review Board
DefCon News: New Website, New Contests
B-Sides News: Summer Schedule, Fall Schedule, Logo Voting Open
Chaos Computer Camp Location

Stack of Shame
count: 156 (

View the Original article

HNNCast.2011.06.10

HNNCast for the second week of June, 2011
Top Stories
Welcome Aboard it’s Lulz, Why You Hack My Shitty Bank, RSA Recall, Latest Sony Pwnage

News
Cupcakes, b107 Not Over Yet, Anonymous v. World, Bletchly’s Tunny, Other Gaming Breaches, Seems Like a Lotta Snitches

Quickies
CC-Compromise Down Under, Disgr-Acer, Cisco Counterfeiters Case Update, UK Jobs, Facebook Not an Open One, chroot(Nsplitter), Peep eTom of BelleAir, Harper Hoax

ConFu
44con Talks, Rootcon Schedule, Zacon CFP, HacKid Locations, RSA CFP

Stack of Shame
count: 137 (-19)
Top Offender: Adobe (36)


 

One Response to ''

Subscribe to comments with RSS

HNNCast for the second week of June, 2011
Top Stories
Welcome Aboard it’s Lulz
http://allthingsd.com/20110606/no-lulzsec-hackers-have-been-arrested-at-least-not-yet/
http://allthingsd.com/20110606/no-lulzsec-hackers-have-been-arrested-at-least-not-yet/
http://www.thetechherald.com/article.php/201123/7236/Unveillance-faces-troubled-waters-in-the-wake-of-LulzSec-visit
http://www.tgdaily.com/security-features/56401-lulz-security-pwns-fbi-affiliated-website
http://www.unveillance.com/latest-news/unveillance-official-statement/
http://pastebin.com/AjVd0L9E
http://it-techblog.com/tag/lulzsec/

Why You Hack My Shitty Bank
http://www.theregister.co.uk/2011/06/09/citibank_hack_attack/
http://www.reuters.com/article/2011/06/09/us-citi-idUSTRE7580TM20110609
http://www.bbc.co.uk/news/technology-13711528

RSA Recall
http://www.nytimes.com/2011/06/04/technology/04security.html?_r

View the Original article

HNNCast.2011.06.17

HNNCast for the third week of June, 2011
Top Stories
Takeover Tuesday, AnonOps Abound

News
IMF Intrusion, Shitibank Shenanigans, Cyber Cold War, Pervert Inside

T00l T1m3
updates: The Sleuth Kit, Inguma, packetfu, BeEF, THC-Hydra, Quick Recon, SWFRE Tools, Wireshark, ZED Attack Proxy, RIPS, Xplico, John the Ripper, ATI Video Drivers, IPv6 Day and Nmap
phresh: WACA, ClamAV lib, EAPeak, Scalpel, Radare, JumpLister
news: Black Hat Tools Arsenal, SysInternals Book

Quickies
Hatin on Soulja Boy, Update from Win-DOH!, Epic Failure, Homo Carders, Online Banking Fraud, Rogue Android Apps, Border War Goes Cyber, Embassy Defacement, School of Fools

Con Fu
Blackhat Speakers Posted, EFF Defcon Getaway

Stack of Shame
count: 129 (-8)
Top Offender: Apple (26)


 

One Response to ''

Subscribe to comments with RSS

HNNCast for the third week of June, 2011
Top Stories
Takeover Tuesday
http://gizmodo.com/5810760/lulz-security-gives-sony-a-break-today-and-takes-down-terrorist-website
http://www.bbc.co.uk/news/technology-13712377
http://www.computerweekly.com/Articles/2011/06/10/246930/Lulz-Security-hacker-group-warns-NHS-to-beef-up-security-following-admin-password.htm
http://www.theregister.co.uk/2011/06/10/lulz_nhs_hack/
http://pastebin.com/ZAm3bepT
http://www.theregister.co.uk/2011/06/13/lulzsec_smut_site_hack/
http://lulzsecurity.com/releases/
http://www.gamepro.com/article/news/220393/bethesda-site-latest-target-for-hackers/
http://www.eveonline.com/news.asp?a

View the Original article

HNNCast.2011.07.08

SHOW CLOSED!

Space Rogue’s Resignation and the closure of the Hacker News Network.

Abba-da-dabba-da-dabba-dabba Dat’s all folks!


 

Leave a Reply

You must be logged in to post a comment.

Posted: July 8th, 2011
at 12:06pm by tan

Tagged with Hack, Hacker, Hacking



View the Original article

Train-switching system can be vulnerable to DDoS attack

", ckw: "Hacker News,News,Vulnerability", pub: "Thursday, December 29, 2011", url: "http://thehackernews.com/2011/12/train-switching-system-can-be.html"

View the Original article

World 1st Hacker exploit communication technology for lulz in1903

New Scientist publish about the first hacker revealing security holes in wireless communication technology in 1903. Nevil Maskelyne was first in a long line of hackers who have exposed and exploited security flaws in communication technology from Morse code to the Internet.
The crowd was somewhat amused as the physicist John Ambrose Fleming was adjusting arcane apparatus as he prepared to demonstrate the long-range wireless communication system developed by his boss, the Italian radio pioneer Guglielmo Marconi. Marconi was 300 miles away in Cornwall trying to send the message.
Before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message.It was a poem which accused Marconi of "diddling the public". Arthur Blok, Fleming's assistant, worked out that beaming powerful wireless pulses into the theatre were going to be strong enough to interfere with the projector's electric arc discharge lamp. It started by spelling "Rats" repeatedly and then ripped into the poem.Maskelyn proved that Marconi's gear was insecure and it was likely that they could eavesdrop on supposedly private messages too.
Maskelyn proved that Marconi's gear was insecure and it was likely that they could eavesdrop on supposedly private messages too. While Marconi did not wave his arms about the hack, which was unusual for an Italian. Fleming fired off a missive to the Times. He dubbed the hack "scientific hooliganism", and "an outrage against the traditions of the Royal Institution". He asked the newspaper's readers to help him find the hacker.
However Maskelyn, whose family had made a fortune making "spend-a-penny" locks in pay toilets outed himself four days later and justified his actions on the grounds of the security holes it revealed for the public good.
Maskelyne used Morse code in "mind-reading" magic tricks and in 1900, Maskelyne sent wireless messages between a ground station and a balloon 10 miles away. However he was stuffed up by the fact that Marconi had such broad patents on the technology and could not develop it. It turned out that he was hired as a spy for the Eastern Telegraph Company which was worried tht Marconi would stuff up its business.
Maskelyne built a 50-metre radio mast on the cliffs west of Porthcurno to see if he could eavesdrop on messages the Marconi Company was beaming to vessels as part of its highly successful ship-to-shore messaging business. In The Electrician magazine in 1902, Maskelyne pointed out that the security on Marconi's set up was a doddle to hack.
Fleming blustered for weeks in the newspapers about Maskelyne's assault being an insult to science but he was snookered by the hack. Maskelyne's name had been forgotten but now he is in the history books as the world's patron saint of hackers.

View the Original article

Anonymous Hackers post spy firms email addresses

", ckw: "Anonymous Hackers,Hacker News,News", pub: "Saturday, December 31, 2011", url: "http://thehackernews.com/2011/12/anonymous-hackers-post-spy-firms-email.html"

View the Original article

Print of one malicious document can expose your whole LAN

background: -webkit-gradient(linear, left top, left bottom, from(#3b5998), to(#3b5998));;border:1px solid #1A2638;border-radius:10px; margin-bottom:10px;padding:10px;text-align:center;background: -moz-linear-gradient(top, #3b5998, #3b5998)

View the Original article

Environmental activism site Care2 hacked

", ckw: "Cyber Crime,Defacements,Hacker News,News", pub: "Sunday, January 01, 2012", url: "http://thehackernews.com/2012/01/environmental-activism-site-care2.html"

View the Original article

The Hacker News Hacking Awards : Best of Year 2011

background: -webkit-gradient(linear, left top, left bottom, from(#3b5998), to(#3b5998));;border:1px solid #1A2638;border-radius:10px; margin-bottom:10px;padding:10px;text-align:center;background: -moz-linear-gradient(top, #3b5998, #3b5998)

View the Original article

Facebook distributing White Hat Debit Card to Bug Bounty Winners

background: -webkit-gradient(linear, left top, left bottom, from(#3b5998), to(#3b5998));;border:1px solid #1A2638;border-radius:10px; margin-bottom:10px;padding:10px;text-align:center;background: -moz-linear-gradient(top, #3b5998, #3b5998)

View the Original article

четвртак, 5. јануар 2012.

Chinese Government taking strong step against Cyber Crime

", ckw: "Chinese Hackers,Cyber Crime,Hacker News,News,Security News", pub: "Monday, January 02, 2012", url: "http://thehackernews.com/2012/01/chinese-government-taking-strong-step.html"

View the Original article

One million pages infected by Lilupophilupop SQL injection

", ckw: "Hacker News,News,Vulnerability", pub: "Monday, January 02, 2012", url: "http://thehackernews.com/2012/01/one-million-pages-infected-by.html"

View the Original article

Facebook Scam : Selena Gomez Caught On Leaked Tape

", ckw: "Hacker News,News,Security News", pub: "Monday, January 02, 2012", url: "http://thehackernews.com/2012/01/facebook-scam-selena-gomez-caught-on.html"

View the Original article

Hackers launching own satellites in orbit to beat Censorship

background: -webkit-gradient(linear, left top, left bottom, from(#3b5998), to(#3b5998));;border:1px solid #1A2638;border-radius:10px; margin-bottom:10px;padding:10px;text-align:center;background: -moz-linear-gradient(top, #3b5998, #3b5998)

View the Original article

Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins

", ckw: "Hacker News,News,Security News,Vulnerability", pub: "Tuesday, January 03, 2012", url: "http://thehackernews.com/2012/01/wait-its-not-just-stuxnet-or-duqu.html"

View the Original article

Zero Day Reflected Cross Site Scripting vulnerability in wordpress 3.3

", ckw: "Hacker News,Indian Hackers,News,Vulnerability", pub: "Tuesday, January 03, 2012", url: "http://thehackernews.com/2012/01/zero-day-reflected-cross-site-scripting.html"

View the Original article

Fully automated MySQL5 boolean based enumeration tool

", ckw: "Downloads,Hacker News,News,Tools", pub: "Tuesday, January 03, 2012", url: "http://thehackernews.com/2012/01/fully-automated-mysql5-boolean-based.html"

View the Original article

Japan developing cyber weapons for Counter Attacks


Japanese technology firm Fujitsu is developing a ‘seek and destroy’ virus which could identify and combat hacking and other cyber threats in a more effective way. The weapon is the culmination of a 179 million yen three-year project entrusted by the government to technology maker Fujitsu Ltd to develop a virus and equipment to monitor and analyse attacks, the daily said.
The chief snag for the plan is that Japanese law currently forbids the manufacturing of computer viruses. However, we would suspect that a compromise can be reached in due course, given the project is being carried out in the interest of national security. Japan was a notable victim of hacking in 2011, which proved to be a year in which cyber crimes and threats rose to prominence. 
Japan’s parliament had its computer system hacked into, while a number of cyber espionage campaigns including one targeting almost 50 US companies were waged on governments and firms across the globe. Currently, the virus is being tested in a "closed environment" to examine its applicable patterns.
Categories: News,Security News

Share This news with your friends on Facebook/Twitter/Forums

: The Hacker News

View the Original article

Android mobile internet tethering become undetectable by carriers

", ckw: "Ebook download,Hacker News,Linux News,News,Technology News,Tools", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/android-mobile-internet-tethering.html"

View the Original article

30 Pakistan government Sites goes down !

", ckw: "Indian Hackers,News", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/30-pakistan-government-sites-goes-down.html"

View the Original article

ColdFusion Zero day vulnerability : Remote File Disclosure of Password Hashes

", ckw: "Ebook download,Hacker News,News,Tools,Vulnerability", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/coldfusion-zero-day-vulnerability.html"

View the Original article

Nmap 5.61TEST4 released with Web Spidering Feature !

", ckw: "Downloads,Hacker News,News,Security News,Tools", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/nmap-561test4-released-with-web.html"

View the Original article

9 Top Patch Management Practices for Businesses Security

", ckw: "Guest Post,News,Security News", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/9-top-patch-management-practices-for.html"

View the Original article

#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released

", ckw: "Downloads,Ebook download,Hacker News,News", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/enteratyourownrisk-cyber-awareness.html"

View the Original article

BackBox Linux 2.01 released

", ckw: "Downloads,News,Security News,Tools", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/backbox-linux-201-released.html"

View the Original article

From the In-Security Land to Security in the Cloud

", ckw: "Ebook download,Hacker News,Linux News,News,Security News", pub: "Wednesday, January 04, 2012", url: "http://thehackernews.com/2012/01/from-in-security-land-to-security-in.html"

View the Original article