Linux Hacks & Cracks - Page 33
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Chinese hacking of American computer networks is old news. For years we've known about their attacks against U.S. government and corporate targets. We've seen detailed reports of how they hacked The New York Times. Google has detected them going after Gmail accounts of dissidents.
Like a crowbar, security software tools can be used for good and evil. Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.
The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.
Tens of thousands of pirate gamers have been enslaved in a Bitcoin botnet after downloading a cracked copy of popular game Watch Dogs.
Mac, iPhone, and iPad owners across Australia are reporting that their devices have been digitally held hostage by a hacker, according to The Sydney Morning Herald.
An anonymous hacker who has exploited an iCloud security flaw that lets anyone unlock a lost or stolen iPhone says Apple contacted him about the matter today, but he deleted the email.
EBay Inc. said that hackers raided its network three months ago, accessing some 145 million user records in what is poised to go down as one of the biggest data breaches in history, based on the number of accounts compromised.
EBay Inc said that hackers raided its network three months ago, accessing some 145 million user records in what is poised to go down as one of the biggest data breaches in history, based on the number of accounts compromised.
Two hackers have figured out a way to unlock lost Apple devices -- a boon for criminals with stolen iPhones and iPads. The hackers have discovered a method for bypassing a protective feature on Apple (AAPL, Fortune 500) devices. Lost your iPhone?
A public utility in the U.S. was compromised after attackers took advantage of a weak password security system, according to a U.S. Department of Homeland Security team that studies cyberattacks against critical infrastructure.
It is nicknamed "creepware," and more than half a million people around the world have been prey to its silent computer snooping. Miss Teen USA Cassidy Wolf was one of them in a well-publicized case of hacking associated with the malware called Blackshades.
A U.S. criminal indictment against Chinese Army personnel over alleged hacking describes how stolen intellectual property was funneled to Chinese companies, an unresolved question for analysts.
With that basic assumption in mind, IOActive decided to assess the vulnerability of communication satellites. In a nutshell, here's what it found:
Alan Solomon, creator of Dr Soloman's Antivirus, has admitted to using Linux to avoid viruses rather than try to combat them on Windows. His comments come after Symantec's Brian Dye estimated that antivirus systems do not even catch half of cyber attacks.
It takes a hacker to catch a hacker. That
A recently reported new "vulnerability" in OAuth appears to be anything but. That unkind assessment has come from security specialists after a flaw called "Covert Redirect" made headlines that conflated the flaw with the Heartbleed vulnerability, a major security risk that legitimately sent administrators scrambling to fix their websites.
Security experts have warned Facebook users in India not to fall for a new scam which tricks victims into
The hacker in the Italian Job did it spectacularly. So did the fire sale team in Live Free or Die Hard. But can hackers really hijack traffic lights to cause gridlock and redirect cars?