Linux Hacks & Cracks - Page 70

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Armenian websites attacked Turkish hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Turkish hackers have attacked several Armenian websites ahead of annual commemorative remembrances of the Armenian Genocide. On April 12th, more than 250 sites were impacted when cyber terrorists attacked a server hosting sites including https://www.armeniachat.com https://armeniasearch.com/ according to the owner of the sites (who wishes to remain anonymous), ANCA Communications Director Elizabeth Chouljian told PanARMENIAN.Net.

Criminals attempt to exploit unpatched hole in Adobe Reader

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to several reports by anti-virus vendors, criminals have attempted to exploit an unpatched hole in Adobe Reader disclosed about two weeks ago to infect Windows PCs. The relevant malware includes the particularly dangerous ZeuS bot. The specially crafted documents are apparently sent to users as email attachments.

'Design Flaw' Led To Wave Of Attacks On Hundreds Of WordPress Blogs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hundreds of WordPress blogs were hacked during the past few days by attackers who pilfered blogger credentials stored in plain text in the database. The researchers who discovered the attacks say a design flaw in the WordPress blogging platform was the underlying problem because by default it allows users to set up permissions that let anyone read their blog's wp-config.php file configuration files, and because WordPress stores the bloggers' credentials in plain text.

Sophos exposes blackhat search engine technique

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IT security firm Sophos has conducted a new research which reveals the automated tools used by Search Engine Optimisation (SEO) hackers and how companies can protect themselves. Sophos said the business of using blackhat SEO techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals.

Wormy attack could spread via PDF

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security researcher Jeremy Conway says he has discovered a way to spread malicious code across PDF documents on a victim's computer. The attack leverages a flaw in the way the PDF file format works, adding malicious data to legitimate PDF files that could then be used to attack anyone who opens them.

Hacks, Counter-Hacks and the Linux-Free PS3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's not clear why Linux fans would even want to run it on a PS3, "when a console is NOTHING but 'DRM... in a box'" says Slashdot blogger hairyfeet. "Even when [Sony] allowed Linux you didn't get access to the full machine -- no GPU access -- which left it an underpowered POWER based PC."

iPad hacked to run Newton OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the iPad rolls out across the United States on Saturday, one developer appears to have gone rogue already. Jonathan E. Vi, one of the few developers to actually get an iPad in advance of the launch, has rigged it to run Apple's old Newton personal data assistant from the '90s. Fire up the Newton emulator app, and the iPad's screen changes to that muted green color with dim gray text and the old Mac fonts.

Booby-trapping PDF files: A new how-to

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security researcher has demonstrated a mechanism that exploits PDF files without taking advantage of any particular vulnerabilities. Didier Stevens' proof of concept exploit relies on running an executable embedded in a PDF file - something that ought to be blocked - by launching a command that ultimately runs an executable.

Fake DNSBL uncovered: nszones.com

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Spamhaus has uncovered a fake spam filter company which was pirating and selling DNSBL data stolen from major anti-spam sysjavascript:submitbutton('save');tems including Spamhaus, CBL and SURBL, republishing the stolen data under the name "nszones.com".

Hacker vows to fight Sony PS3 update, restore Linux support

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

iPhone hacker George Hotz, aka "GeoHot," was able to finally crack the PlayStation 3... three years after the system's release. He praised the hardware for its security, but now that Sony has responded by removing the Linux capabilities of the PlayStation 3 entirely, the hacker has decided to fight back, warning gamers not to update their systems until he finds a way to keep the Other OS option on the PlayStation 3.

Another week of hacks, malware, and cyber crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A smattering of security stories reveals the ongoing challenges to protecting systems and data. From the discovery of the first serious iPhone 3G exploit to the sighting of a new Captcha-conquering bot, the past week has proven interesting in the world of IT security, so much so that I've decide to take a look at several of stories that have cropped up, rather than doing my regular deep-dive into a specific topic.