Linux Hacks & Cracks - Page 51
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Could a hacker from half-way around the planet control your printer and give it instructions so frantic that it could eventually catch fire? Or use a hijacked printer as a copy machine for criminals, making it easy to commit identity theft or even take control of entire networks that would otherwise be secure?
The Anonymous hacking collective's AntiSec group has launched a fresh assault on law enforcement agencies with the release of what they claim are personal emails stolen from a Californian cybercrime investigator. The cache of emails
A new reverse proxy issue affecting Apache HTTP server can be used by attackers to access internal systems if certain rules are improperly configured, a security researcher said.
If your IPv6 strategy is to delay implementation as long as you can, you still must address IPv6 security concerns right now. If you plan to deploy IPv6 in a dual-stack configuration with IPv4, you're still not off the hook when it comes to security. And if you think you can simply turn off IPv6, that's not going to fly either.
The cybersecurity world is awash in oceans of porn, blown water pumps and civil liberties rhetoric. Facebook was slammed with an attack recently that left some users reaching for a bottle of eye bleach, while hackers elsewhere apparently were able to temporarily control parts of a small public utility. Meanwhile, the DoJ sought new powers that could impact you if you ever use an assumed name anywhere online.
The cyberwar discussion is mired in confusion. What defines an act of cyberwar? Is it a sophisticated hack from China or Russia that shuts down the U.S. power grid? Is it a rogue group like Anonymous breaking into government sites? Is it all the spying China has been doing for several years now?
An Austrian security analyst has built the first known bootkit that bypasses Windows 8's defenses against installing malware while the operating system is booting.
Hackers gained remote access into the control system of the city water utility in Springfield, Illinois, last week and destroyed a pump, according to a report released by a state fusion center and obtained by a security expert.
A court in Romania has ordered the arrest of a Romanian man accused of hacking into NASA
The ABC7 News I-Team has discovered that some of the same people who launched the Occupy movement are now considering a plan to occupy the airwaves. By hijacking radio and television stations, they could create a nationwide panic.
Santa Clara University's academic records database was recently hacked to improve the grades of more than 60 former and current undergraduate students, the university announced Monday.
At the SysCan conference in Taiwan this week, security researcher Charlie Miller will describe a flaw he discovered in the iPhone
Not too long ago the Stuxnet worm was discovered, and it seems that according to security analysts, if not dealt with quickly the Stuxnet worm could be exploited by hackers and allow them to remotely open the doors of maximum security prison.
The Ruby developers had a near miss with a crypto disaster when an "awful bug" crept into the language's source code development tree. A simple programming error made the library generate RSA keys that caused the encryption mechanism to produce clear text.
Computer systems used to control federal prison facilities are riddled with vulnerabilities that might allow criminals to meddle with cell door opening mechanisms or shut down internal communications systems, according to security researchers.
Federal authorities are concerned about new research showing U.S. prisons are vulnerable to computer hackers, who could remotely open cell doors to aid jailbreaks.
A hacking group called d33ds broke into the online shop of a rival hacker who sells unauthorized access to high-profile websites and data.
A hacker who repeatedly breached eBay's servers has been given a three-year suspended sentence by a Romanian court.
SECURITY FIRM Bitdefender has traced a number of brute force web site attacks on a server at the Massachusetts Institute of Technology (MIT),
Anti-virus firm Avast reportsPDF that criminals are exploiting a critical hole in the TimThumb WordPress add-on to deploy malicious code on a large scale. Avast says that it blocked more than 2,500 infected sites in September and anticipates a similar number in October.