Linux Hacks & Cracks - Page 59

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

PHP developer wiki server hacked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to the development team, access details for a number of accounts were stolen during a hack of the PHP developer wiki server wiki.php.net. Initial investigations have found that no other servers were compromised, but there was concern that the PHP source code might have been modified, as the stolen access data also provides access to the PHP repository.

Phishers Bypass Browser Filters

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Looks like those anti-phishing filters in your browser are working because attackers are now bypassing them by stuffing HTML files into spam messages so the malicious pages don't get detected: Researchers have detected several cases of phishers passing HTML file attachments off as Bank of America, Lloyds, TSB, and PayPal pages.

RSA Security Says Hackers Got Data on SecurID

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hackers obtained data related to SecurID, RSA Security says. Professional hackers using an Advanced Persistent Threat obtained unspecified information that RSA Security said cannot enable a direct attack on customers. RSA Security said it is helping customers strengthen SecurID. An analyst likened the attack to "breaking into Fort Knox."

Under the phishing filters' radar

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Criminals are reportedly using a new phishing technique that allows them to bypass the fraud warnings issued by modern browsers such as Firefox and Chrome. On its blog, security firm M86Security reports that the trick involves attaching an HTML document instead of sending a link. It remains unclear how many users have become victims so far.

How an MP3 can be used to hack your car

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's not just your computer that's at risk of malware - dodgy MP3s can now take over your car. Last year, a team of researchers at the US Center for Automotive Embedded Systems Security revealed how automobile computer systems could be hacked via the On-Board Diagnostics (OBD-II) port, an access point typically used by engineers to download data on the vehicle's health.

10 Massive Security Breaches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach.