Linux Hacks & Cracks - Page 31
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Reporting on the hacker collective Anonymous is always fraught. This loosely organized group has no clear leader and no clear agenda. The anarchic nature of its technological attacks make it difficult to establish a who-what-where-when-why. And, of course, hackers use nom de guerres. Heck: Even the Islamic State has a spokesman.
Somehow there always seems to be another Internet security disaster around the corner. A few months ago everyone was in a panic about Heartbleed. Now the bug called Shellshock (officially CVE-2014-6271), a far more serious vulnerability, is running uncontrolled over the Internet.
With a bug as dangerous as the
The flaw involves how Bash evaluates environment variables. With specifically crafted variables, a hacker could use this hole to execute shell commands. This, in turn, could render a server vulnerable to ever greater assaults.
The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere. Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
It is clear why malware writers target TGT -0.1% such retailers as Home Depot HD -0.43% and Target. It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. But a company
Some older versions of the open source Apache Tomcat web server and servlet container, are vulnerable to remote code execution.
Plain-text passwords and account names linked to five million Gmail accounts have been leaked onto several Russian forums. Security experts had already confirmed the data seemed legit, albeit approximately three years old, before Google put up its blog post on the subject.
Twitter is one of my favorite social platforms. As a journalist, I get news from it, but I also get to interact with my peers and friends. But Twitter, like every other social platform, has an interesting attack surface; one that criminals have been exploiting for years.
Text messages containing VPN passwords and authentication codes for Google and Facebook are found on a command-and-control server for Android malware
After private photographs of some of the most famous women in the world were posted online, journalists, PR representatives, and curious internet users alike scrambled to figure out how a nameless hacker had gained access to the cell phones of the rich and famous.
Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs. Hackers and cybercrooks do the same. The last thing you want if you
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
Gamers have been annoyed all day today as a hacker collective (or individual) known as the
An increasing number of ATM skimmers targeting banks and consumers appear to be of the razor-thin insert variety. These card-skimming devices are made to fit snugly and invisibly inside the throat of the card acceptance slot. Here
New research reveals that BitTorrent swarms can be slowed down significantly by malicious peers. Depending on the number of seeders and the clients they use, download times can be increased by 1000%. The attacks are possible through an exploit of the BitTorrent protocol for which the researchers present a fix.