Linux Hacks & Cracks - Page 25
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
BIND operators released new versions of the DNS protocol software overnight to patch a critical vulnerability which can be exploited for use in denial-of-service cyberattacks.
An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was business as usual for the hacking group, which over the past three years has carried out more than a dozen similar attacks.
Arbor Networks' Sam Curry talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.
If your smartphone or tablet vendor doesn't fix the Stagefright security hole, this text-message based malware can be really scary. But you can protect yourself from it with a few simple steps.
Customers who hired the infamous ID theft-protection firm Lifelock to monitor their identities after their data was stolen in a breach were in for a surprise. It turns out Lifelock failed to properly secure their data.
What happens in Vegas stays in Vegas. But for newbies, these helpful hints will make sure you get the most out of the Black Hat USA experience.
Anonymous is at it again, this time in response to the recent disputed police killing of Paul Castaway, a Denver resident and member of the Lakota Indian tribe.
Symantec has identified a group of cybercriminals, whom they've named "Morpho," as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft among those hit. "Attackers going after intellectual property is not that usual," said Vikram Thakur, senior manager at Symantec.
Data breaches at the U.S. government's personnel management agency by hackers, with suspicions centering on China, involves millions more people than previously estimated, U.S. officials said on Thursday.
Hacking Team has warned that a devastating data breach it suffered will allow its spying tools to be used by criminals and terrorists.
Many companies, including leading corporations and financial institutions, think that a website is just a
The cyberattacker who stole 400GB in corporate data belonging to spyware firm Hacking Team has come forward. Hacking Team has not had a good week. The Milan, Italy-based company, known for selling surveillance and spyware tools to government agencies and private companies, experienced a data breach over the weekend which led to the alleged theft of 400GB of corporate data.
On Sunday, while most of Twitter was watching the Women's World Cup
Life would be simpler if every piece of technology we dealt with worked in an obvious and straightforward way. Life would also be a lot duller.
Attackers use the same tools in attacks that pen testers use to test. Six sample vulnerabilities and exploits.
Individuals in Ukraine were arrested by European law enforcement last week in a joint operation that targeted members of a group suspected of developing, distributing and using Zeus and SpyEye banking malware.
CNN is reporting that the personal data of 18 million current, former, and prospective federal employees was stolen in the cyberattack that targeted the Office of Personnel Management (OPM) hack.
Every day, the security team at network services provider Level 3 Communications monitors approximately 1.3 billion security events; mitigates roughly 22 distributed denial of service (DDoS) attacks; and removes, on average, one control and command (C2) server network.
Any device with a computer chip can be hacked, but not all hacks are created equal. In fact, in a world where tens of millions of computers are compromised by malware every year and nearly every company's network is owned, truly innovative or thought-provoking hacks are few and far between.