Linux Hacks & Cracks - Page 63
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
McDonald's has lost thousands of customer details to a hacker, including names, phone numbers and street and e-mail addresses. The fast food chain is also warning of pending phishing scams.
Gawker Media has admitted passwords were stolen in a hack on its user databases. Whilst the stored passwords were encrypted, Gawker said, simple ones may still be vulnerable to a brute force attack, where constant attempts to crack the key are made until the hackers are successful.
Genesco Inc., which operates stores that sell shoes and hats, said Friday it was the victim of a cyber attack, and the extent of the damage is unknown.
THE WIKILEAKS LEAKS have shown that Chinese security firms with ties to the Chinese military hired the hacker group responsible for the original Blaster worm.
A computer consultant is embarking where Apple has refused to go, adding a security measure known as ASLR to iPhones to make them more resistant to malware attacks.
Julian Assange of WikiLeaks is fighting a lot of enemies right now, including at least one from an unexpected place: The computer underground. A hacker calling himself The Jester
Unknown attackers penetrated the server hosting the open source ProFTPD FTP server project and concealed a back door in the source code. The back door provides the attackers with complete access to systems on which the modified version of the server has been installed.
A COMPUTER hacker infected more than 2000 computers in Australia and overseas with a program to capture banking details, a court has heard.
The Web front end for a Free Software Foundation software repository remains down after the server it was hosted on was attacked last week.
Computer hackers have broken into a state government website for the third time this year, exposing continued vulnerabilities in the state's digital security programs.
Google is working to patch a new data-stealing vulnerability that affects all versions of the Android operating system. The vulnerability was discovered by security researcher Thomas Cannon. "While doing an application security assessment one evening I found a general vulnerability in Android which allows a malicious website to get the contents of any file stored on the SD card," he said on his blog.
A computer hacker who calls himself "The Jester" claimed responsibility for the cyber attack which took down the WikiLeaks site Sunday, shortly before it started posting hundreds of thousands of classified U.S. diplomatic cables.
Michael Calce, the reformer hacker from Montreal who will forever be known as Mafiaboy, told a group of IT professionals yesterday that he has serious concerns about the inherent vulnerabilities in the latest evolution of information technology: cloud computing.
The head of a major cyber gang who targeted many UK homes and businesses has been sentenced to 18 months in prison. Matthew Anderson, a 33-year-old security expert, was helping run a collection of cyber criminals known as the m00p group, who sent millions of malicious emails to both homes and businesses.
A federal grand jury Thursday indicted Lin Mun Poo, a 32-year-old resident and citizen of Malaysia, on charges of hacking into the Federal Reserve Bank, as well as possessing more than 400,000 stolen credit and debit card numbers. If convicted of the most serious offenses, he would face a maximum sentence of 10 years.
Three California men have pleaded guilty charges they built a network of CAPTCHA-solving computers that flooded online ticket vendors and snatched up the very best seats for Bruce Springsteen concerts, Broadway productions and even TV tapings of Dancing with the Stars.
A malware analyst has deconstructed a highly advanced piece of crimeware believed to be the work of the notorious Russian Business Network. The step-by-step instructions for reverse engineering the stealthy ZeroAccess rootkit is a blow to its developers, who took great care to make sure it couldn't be forensically analyzed.
An IT security researcher has reportedly released the source code that could allow a hacker to gain remote access to a Google Android smartphone across the internet.
For the past few weeks The Tech Herald has been tracking an interesting BlackHat SEO campaign. It targeted trending keywords and topics related to the midterm elections, Halloween, Veterans Day and more, snaring an untold number of victims in the process. So what are these attacks? How do they work? What can you do as a webmaster to avoid them or avoid falling victim to them?
With more than 600,000 copies of the FireSheep browser plug-in downloaded in a matter of weeks, Web security firm zScaler have released a new Firefox plug-in, BlackSheep, in hopes of combating attempts by those using FireSheep to try to hijack their Web session.