Linux Hacks & Cracks - Page 35
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Researchers at England's University of Liverpool have created Chameleon, a virus that can proliferate via Wi-Fi as efficiently as the common cold infects humans. British researchers have created a computer virus that they say is the first to spread like a real airborne contagion.
Businesses considering accepting Bitcoins or other forms of cryptocurrency should be prepared to battle a rising number of malware aimed at emptying digital wallets.
Around two in five people who fall victim to CryptoLocker have agreed to pay a ransom of around
Cybercriminals have infected the computers of digital currency holders, using a virus known as "Pony" to make off with account credentials, bitcoins and other digital currencies in one of the largest attacks on the technology, security services firm Trustwave said.
Business news site Forbes.com was still recovering today from the after-effects of an attack by hackers that exposed the email addresses of more than a million of its users and forced it to take its blogging platform down.
If you're using network-attached storage, video surveillance equipment, or remote router management software, beware of dodgy firmware--it's become ground zero for hacker exploits, as recent debacles with Asus and Linksys routers emphatically illustrate.
The dramatic increase in the number of security attacks and the sophistication of the cyber criminals masterminding them means there is a critical need for businesses to take a more radical approach to their information security.
While the big data breaches at Target, Neiman Marcus and Michaels have drawn heavy news coverage, the everyday machinations of various specialists in the cyberunderground remain out of sight and out of mind to most people.
A small US law firm has bravely admitted losing its entire cache of legal documents to the Cryptolocker Trojan despite attempting to pay the $300 (
A secret British spy unit created to mount cyber attacks on Britain
Security vendor Sucuri is warning that it's spotted an attack in the wild that embeds malicious code in PNG files.
Anti-NSA hackers defaced Rovio's official Angry Birds website on Tuesday night as a reprisal against revelations that GCHQ and the NSA were feasting on data leaked from the popular smartphone game.
Documents linked with law enforcement inquiries appear to have been stolen in recent phishing attacks on certain employee email accounts, Microsoft said.
Pump-mounted devices used Bluetooth chips that allowed the thieves to retrieve the data without having to physically connect to the devices, prosecutors allege.
In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com.
It's believed that human error caused a glitch in the country's firewall, sending people to a company that sells anti-censorship technology to Chinese citizens.
The U.S. National Security Agency has reportedly developed technology to commandeer computers even when they are off the Internet, and security experts warn it's only a matter of time before similar tools become part of cybercriminals' toolbox.
Reports this week that the National Security Agency uses radio signals to collect data from tens of thousands of non-U.S. computers, some not connected to the Internet, is sure to fuel more acrimony towards the U.S. spy agency.
A teenager in Australia who thought he was doing a good deed by reporting a security vulnerability in a government website was reported to the police.