Linux Hacks & Cracks - Page 28
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
There's more bad news surrounding the HTTPS-crippling FREAK vulnerability that came to light two weeks ago. A recently completed scan of the Internet revealed 10 percent of servers that support the underlying transport layer security protocol remain susceptible.
Gamers may soon be feeling the pain of crypto-ransomware. A variant of CryptoLocker is in the wild that goes after data files associated with 20 different online games, locking downloadable content in an attempt to target younger computer users.
Not long ago, criminals pushing the Dridex banking Trojan were using Microsoft Excel documents spiked with a malicious macro as a phishing lure to entice victims to load the malware onto their machines.
A self-described security "amateur" discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection -- meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse.
Some D-Link routers contain a vulnerability that leaves them open to remote attacks that can give an attacker root access, allow DNS hijacking and other attacks.
British hacker Stephen Tomkinson has found two Blu-Ray-borne attacks. His first exploit relies on a poor Java implementation in a product called PowerDVD from CyberLink. PowerDVD plays DVDs on PCs and creates menus using Java, but the way Oracle's code has been used allows naughty folk to circumvent Windows security controls.
An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim
Apparently no vulnerability is too small, no application too obscure, to escape a hacker
More than one million websites that run on the WordPress content management application run the risk of being completely hijacked by attackers exploiting critical vulnerability in most versions of a plugin called WP-Slimstat.
In a statement to Ars Technica, Adi Pinhas, CEO of Superfish Inc. said his company's pre-installed advertising software on Lenovo PCs poses no security risk
Cybercrooks have cooked up a Linux backdoor boasting multiple malicious functions. The Swiss Army Knife-style malware
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that
Health insurer Anthem has confirmed the likely loss of millions of records relating to US citizens in what could be the largest cyberattack in the sector to date.
Syrian opposition leaders lost gigabytes of secret communications and battlefield plans to hackers who baited them into downloading malware during flirtatious Skype chats, according to a report released Sunday.
To his family, he was former Eagle Scout Ross Ulbricht. To his housemates, he was
These new-generation systems can be simple to sophisticated in their ability to detect entry into your home, and much more. Most are now integrating remote monitoring and control of home automation systems, and this was clearly evident at the recent Consumer Electronics Show in Las Vegas, where an incredible array of life-safety and comfort technology was on display.
Hackers extorted thousands of dollars out of the Silk Road marketplace through threats of hitting the site with denial of service attacks or exposing severe security vulnerabilities.
The user names and email addresses of 20 million visitors to Russian online dating website Topface have reportedly been put up for sale on a crime forum, according to anti-fraud firm Easy Solutions.
A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines.