Linux Hacks & Cracks - Page 28
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim
Apparently no vulnerability is too small, no application too obscure, to escape a hacker
More than one million websites that run on the WordPress content management application run the risk of being completely hijacked by attackers exploiting critical vulnerability in most versions of a plugin called WP-Slimstat.
In a statement to Ars Technica, Adi Pinhas, CEO of Superfish Inc. said his company's pre-installed advertising software on Lenovo PCs poses no security risk
Cybercrooks have cooked up a Linux backdoor boasting multiple malicious functions. The Swiss Army Knife-style malware
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that
Health insurer Anthem has confirmed the likely loss of millions of records relating to US citizens in what could be the largest cyberattack in the sector to date.
Syrian opposition leaders lost gigabytes of secret communications and battlefield plans to hackers who baited them into downloading malware during flirtatious Skype chats, according to a report released Sunday.
To his family, he was former Eagle Scout Ross Ulbricht. To his housemates, he was
These new-generation systems can be simple to sophisticated in their ability to detect entry into your home, and much more. Most are now integrating remote monitoring and control of home automation systems, and this was clearly evident at the recent Consumer Electronics Show in Las Vegas, where an incredible array of life-safety and comfort technology was on display.
Hackers extorted thousands of dollars out of the Silk Road marketplace through threats of hitting the site with denial of service attacks or exposing severe security vulnerabilities.
The user names and email addresses of 20 million visitors to Russian online dating website Topface have reportedly been put up for sale on a crime forum, according to anti-fraud firm Easy Solutions.
A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines.
Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
An electronic dongle used to connect to the onboard diagnostic systems of more than two million cars and trucks contains few defenses against hacking, an omission that makes them vulnerable to wireless attacks that take control of a vehicle, according to published reports.
Free online code repositories such as GitHub provide a valuable collaboration service for enterprise developers. But it
Trend Micro researcher Kyle Wilhoit says the latest attacks on SCADA and industrial control networks are turning out to carry rather pedestrian banking Trojans, and have been on the rise since October 2014.
Previous stories on KrebsOnSecurity about ATM skimming attacks have focused on innovative fraud devices made to attach to the outside of compromised ATMs. Security experts are now warning about the emergence of a new class of skimming scams aimed at draining ATM cash deposits via a novel and complex attack.
A pair of security researchers have found a buffer overflow vulnerability within the implementation of the unified extensible firmware interface (UEFI) within the EDK1 project used in firmware development.