Linux Hacks & Cracks - Page 72
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A well-known security researcher yesterday showed how to subvert security in the Oracle 11g database by exploiting zero-day vulnerabilities that would let a savvy user gain full and complete control. Researcher claims hack of processor used to secure Xbox 360, other products
Here is a hugely popular article on LinuxSecurity.com from 2007 that is even more true today.Two Cambridge researchers have devised a relay attack with a hacked chip and PIN terminal that could enable attackers to bypass bank card security measures. Saar Drimer and Steven Murdoch, members of the Cambridge University Computer Laboratory, demonstrated in January how they could modify a supposedly tamper-proof chip and PIN terminal to play Tetris. They have now extended the hack to demonstrate how they can compromise the system by relaying card information between a fake card and a genuine one.
The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws
Apple fans are often smug about their immunity to virus attacks on their Macs and iPhones. Well, these devices are hardly safe from viruses, worms, or other attacks, but it's true that they're more secure than Windows PCs. A recent report from antivirus vendor Intego shows how few attacks made their way into the iPhone and Mac worlds last year.
A number of Congressional websites were defaced with abuse aimed at President Obama following Wednesday's State of the Union address. Websites maintained by Congressmen including Charles Gonzalez (Texas), Spencer Bachus (Alabama) and Brian Baird (Washington) were replaced with a one-line abusive message aimed at Obama by the "Red Eye Crew" from Brazil in the early hours of Thursday morning.
If you're surfing the web from a wireless router supplied by some of the biggest device makers, there's a chance Samy Kamkar can identify your geographic location. That's because WiFi access points made by Westell and others are vulnerable to XSS, or cross-site scripting, attacks that can siphon a device's media access control address with one wayward click of the mouse.
Popular technology site TechCrunch was hit by potty-mouth hackers late on Monday, leaving the site temporarily unavailable. A notice on TechCrunch.com's front page on Tuesday morning explains that "TechCrunch.com was compromised by a security exploit". Access to the site's story archive has been suspended leaving a two para notice on the hack as the only content visible on the site.
George Hotz, aka Geohot, the 20-year-old hacker who successfully cracked the Apple iPhone, claimed in a Friday blog post that after working on the PlayStation3 for nearly five weeks, he has finally managed to hack Sony
After over three years on the market, the PlayStation 3 has finally been hacked. Famous iPhone hacker George Hotz, aka "GeoHot", has become the first to achieve the feat, though what this means for the PS3 modding community remains to be seen.
Data breaches at U.S. companies attributed to malicious attacks and botnets doubled from 2008 to 2009 and cost substantially more than breaches caused by human negligence or system glitches, according to a new Ponemon survey to be released on Monday.
The hackers who stole and published 33 million passwords from the Rockyou.com website in December needn't have bothered, a security company has revealed. Many of them were so trivial they could have been guessed anyway.
Hackers seeking source code from Google, Adobe and dozens of other high-profile companies used unprecedented tactics that combined encryption, stealth programming and an unknown hole in Internet Explorer, according to new details released by the anti-virus firm McAfee.
The dangerous Internet Explorer attack code used in last month's attack on Google's corporate networks is now public. The code was submitted for analysis Thursday on the Wepawet malware analysis Web site, making it publicly available. By Friday, it had been included in at least one publicly available hacking tool and could be seen in online attacks, according to Dave Marcus, director of security research and communications at McAfee.
Router manufacturer D-Link admitted that some of its routers have a vulnerability that could allow hackers access to a device's administrative settings, but it has issued patches.
Officials at Suffolk County National Bank in Long Island, N.Y. this week are warning more than 8,000 customers that their account login information was likely compromised in November, when a hacker illegally accessed a server hosting its online banking system.
What is social engineering? What are the most common and most current tactics? And how can your organization prevent these scams? A guide on how to stop social engineering.
The plot thickens. According to iDefense Labs, the recent Internet attack that has so upset Google affected 33 other US tech and defence firms and is directly related to an Adobe Reader-based attack of last July.
A Miami-based hacker plead guilty this week for his role in orchestrating a series of massive data security breaches that bilked retailers and financial firms of tens of millions of credit and debit cards.
An Israeli hacker says he has broken copyright protections built in to Amazon's Kindle for PC, a feat that allows ebooks stored on the application to work with other devices.