Linux Hacks & Cracks - Page 65

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Is your computer a zombie?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You might think that since you use a personal laptop at home, and not a computer at a cafe, you are safe from hackers. Well, think again. Hackers don't even need to have physical access to your computer to be privy to all the information it contains.

VoIP Abuse Project Blacklists Attackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security expert at a managed services provider has kicked off a project to expose and blacklist the networks hosting VoIP attacks against his and other companies' VoIP PBX servers. The VoIP Abuse Project uses a honeypot to gather as much data as it can from incoming VoIP attacks, including the IP address and a recording of what the call was sending.

Hackers Hit Twitter More for Devilry Than Profit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest hacker to hit Twitter this week unleashed a smutty bit of code that redirected unwitting users to a porn site. Such hacks are certainly unwelcome, but they resemble the not-for-profit pranks pulled by hackers of a bygone era. Nowadays, black-hat hacking is big business. Will malware writers soon see more financial opportunities in attacking Twitter?

Hackers meet in 'geeks' paradise'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Away from the elegance of Budapest's historic centre, a dingy rock venue has been turned into a geek's paradise. The laptop screens glow in the dim light as fingers flicker quickly over keyboards. Lines of code, incomprehensible to all but the cognoscenti, are typed out.

Hacker breaks into ATMs for good, not evil

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I'd just bought Barnaby Jack a pint of Harp when it hit me: Shouldn't he be buying my beer? Jack, as you might know, is the good-guy hacker who figured out a way to digitally hijack ATMs and command them to spit out $20 bills. Not that he would ever do that to buy a columnist a beer - or for any other reason, for that matter.

New government ID cards easily hacked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

News of the German ID card. The sensitive personal information found on the new German identification cards with data chips scheduled for nationwide introduction this November can be easily hacked, according to testing done by a TV news show.

Hackers say they can

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Less than a day after Apple released its iOS 4.1 operating system, hackers say they have jailbroken the software for the iPhone 4. In doing so, hackers have shown time and again that they can beat the security systems that Apple puts in place to keep control of its hardware devices.