Linux Hacks & Cracks - Page 53
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Maintainers of the open-source Apache webserver are warning that their HTTP daemon is vulnerable to exploits that expose internal servers to remote attackers who embed special commands in website addresses.
Security experts at Context have discovered a hole in the Apache web server that allows remote attackers to access internal servers. The mod_rewrite rewrite engine ensures that requests are distributed across different servers according to definable rules, for example, in order to balance loads or to separate dynamic and static content.
Russian VXers have begun using obnoxious barcode-on-steroids QR codes as a launchpad for mobile malware. A recently identified malicious Quick Response code on a Russian website links through a series of redirections to a site punting a Trojan version of the Jimm mobile ICQ client.
THE US Department of Homeland Security has warned financial companies to be vigilant about a cyber security threat from Anonymous.
Hackers have posted personal information about the chief executive of J.P. Morgan Chase in solidarity with the Occupy Wall Street protests.
From 2005 through today, SQL injection has been responsible for 83% of successful hacking-related data breaches. It is estimated that there are a total of 115,048,024 SQL injection vulnerabilities in active circulation today.
Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. But what about the rest of us, who might not have particularly salacious photos or voice messages stored in our phones, but nonetheless have e-mails, credit card numbers and records of our locations?
USA Today's Twitter account was hacked, apparently by the same group that breached the Twitter accounts of NBC and Fox News.
The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday. Security vendor Armorize noticed the problem at around 5 a.m. Pacific Time Monday. Hackers had installed JavaScript code that threw a variety of known browser attacks at visitors to the site, so those with out-of-date browsers or unpatched versions of Adobe Flash, Reader or Java on their Windows PCs could have been quietly infected with malicious software.
Hacking "is very, very difficult to put into an interesting movie story, because the technology is buried in code and programming, and it's about the most uninteresting kind of thing you could ever depict anybody engaging in," says Donn Parker, a security expert who has consulted on numerous hacker films.
Hacktivist group Anonymous is planning to hold a special "Day of Vengeance" in several cities around the U.S. on Saturday.
Security specialist Patrick Dunstan reports that Mac OS X 10.7 "Lion" allows standard non-root users to access other users' password hashes. Under Mac OS X, users' password hashes are stored in shadow files that can usually only be accessed by root users.
The publisher of the uTorrent file-sharing program has admitted to suffering a major security breach that allowed attackers to substitute downloads of its client for malware pushing fake antivirus software.
The websites of several Mexican government ministries, including Defense and Public Security, went offline on Thursday, and a hacker group claimed responsibility.
Popular P2P file sharing company said its systems were breached Tuesday, enabling an attacker to replace its uTorrent client download with scareware.
The Web site that hosts uTorrent was hacked by an unknown person or group early this morning. After initially stating that the "mainline" BitTorrent site had been hacked as well, the company now says that it doesn't think that BitTorrent.com was affected. BitTorrent, the owner of the Web sites and the torrent clients hosted there, reported in a blog post that the breach occurred around 4:20 a.m PT.
Chinese AV vendor 360 has discovered a virus in the wild that makes its home in a computer's BIOS, where it remains hidden from conventional virus scanners. The contaminant, called Mebromi, first checks to see whether the victim's computer uses an Award BIOS. If so, it uses the CBROM command-line tool to hook its extension into the BIOS.
Cybercrooks have set up a web store that offers rented access to compromised machines on the TDSS/TDL-4 botnet. The latest version of the TDSS botnet agent bundles a component that turns compromised machines into a proxy connected to awmproxy.net.
He claims to be 21 years old, a student of software engineering in Tehran who reveres Ayatollah Ali Khamenei and despises dissidents in his country.
The digital miscreant known as ComodoHacker has claimed responsibility for the high-profile DigiNotar digital certificate authority hack.