Linux Hacks & Cracks - Page 65
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The Cryptome whistleblowing website was hacked last weekend in an attack that could have compromised sensitive data, possibly including the email addresses of top secret sources for leaks sent to the site.
You might think that since you use a personal laptop at home, and not a computer at a cafe, you are safe from hackers. Well, think again. Hackers don't even need to have physical access to your computer to be privy to all the information it contains.
A security expert at a managed services provider has kicked off a project to expose and blacklist the networks hosting VoIP attacks against his and other companies' VoIP PBX servers. The VoIP Abuse Project uses a honeypot to gather as much data as it can from incoming VoIP attacks, including the IP address and a recording of what the call was sending.
Hackers are preparing to raise the stakes in their next assault on anti-piracy organisations after they crippled the website of the Australian Federation Against Copyright Theft (Afact) on Tuesday.
After the piracy activist group known as 4can targeted the MPAA and RIAA websites with a distributed denial of service (DDoS) attack one week ago, a group of activists has locked on a new target: anti-piracy lawyers.
For years the Pirate Bay file-sharing index portal has skated on legally thin ice, but now the site
Two of the three hackers who disrupted the website Comcast Corp. maintains for its Internet customers were sentenced to 18 months in prison Friday by a federal judge in Philadelphia.
How confident are you that your computer is safe from an online attack? Chances are you rely on vendors like Microsoft and Apple to let you know when a security update is ready to be installed. (Google updates systems automatically.)
It infected thousands of Twitter accounts, even reaching the White House itself. But the virus that caused havoc on the microblogging site was not started by a shadowy group of hackers - it was discovered by a 17-year-old schoolboy.
The latest hacker to hit Twitter this week unleashed a smutty bit of code that redirected unwitting users to a porn site. Such hacks are certainly unwelcome, but they resemble the not-for-profit pranks pulled by hackers of a bygone era. Nowadays, black-hat hacking is big business. Will malware writers soon see more financial opportunities in attacking Twitter?
Attackers have used a freely available exploit to target a number of 64-bit Linux machines, according to a Linux patch management software firm.
Malicious hackers are preying on iPhone users who want to jail-break their devices, exploiting the increased interest around jail-breaking tools to launch malware attacks.
Away from the elegance of Budapest's historic centre, a dingy rock venue has been turned into a geek's paradise. The laptop screens glow in the dim light as fingers flicker quickly over keyboards. Lines of code, incomprehensible to all but the cognoscenti, are typed out.
I'd just bought Barnaby Jack a pint of Harp when it hit me: Shouldn't he be buying my beer? Jack, as you might know, is the good-guy hacker who figured out a way to digitally hijack ATMs and command them to spit out $20 bills. Not that he would ever do that to buy a columnist a beer - or for any other reason, for that matter.
The advertising server of The Pirate Bay has been hacked and exploited to spread viruses and trojans among users of the site. The hackers targeted a vulnerability in the site
One of the masterminds behind the $9 million hack into RBS WorldPay received a six-year suspended sentence in Russia, according to local reports Wednesday.
The VMware ESX hypervisor could let IT staff steal sensitive data by abusing administrative access, particularly if customers fail to implement role-based access controls, the security vendor BeyondTrust argued last week at VMworld.
News of the German ID card. The sensitive personal information found on the new German identification cards with data chips scheduled for nationwide introduction this November can be easily hacked, according to testing done by a TV news show.
Less than a day after Apple released its iOS 4.1 operating system, hackers say they have jailbroken the software for the iPhone 4. In doing so, hackers have shown time and again that they can beat the security systems that Apple puts in place to keep control of its hardware devices.
Eastern Michigan University officials said this morning that a security breach discovered Saturday has compromised login information for students and staff.