Linux Hacks & Cracks - Page 37
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Researchers have unearthed an online database full to the brim of stolen account information from popular services including Facebook, Yahoo, Twitter and Google.
Ralph Langer has written the definitive analysis of Stuxnet: short, popular version, and long, technical version. Stuxnet is not really one weapon, but two. The vast majority of the attention has been paid to Stuxnet's smaller and simpler attack routine -- the one that changes the speeds of the rotors in a centrifuge, which is used to enrich uranium.
Earlier this month, Jeremy Hammond was sentenced to 10 years in prison for his role in the hack of security consultancy Stratfor Global Intelligence. Hammond is the biggest fish to be snared after the FBI managed to turn former top Anon Sabu into a confidential informant. His conviction is a dagger in the side of the struggling hacktivist movement.
In 2004, a few years before the rise of Anonymous, the notorious online collective of hackers and activists, a seventeen-year-old named Jeremy Hammond gave a talk on
Forumware giant vBulletin.com has admitted that it's been turned over by hackers who made off with customer user IDs and encrypted passwords.
A new spate of vulnerabilities have been found in a D-Link router, a security researcher said Monday. The D-Link 2760N, also known as the D-Link DSL-2760U-BN, is susceptible to several cross-site scripting (XSS) bugs through its Web interface, reported ThreatPost.
Online threats are part-and-parcel of life on the Web -- but the end of the year proves to be a lucrative time to give cybercriminals the gift of your bank details or personal data.
Singapore charged on Tuesday a 35-year-old man suspected of hacking a website linked to the prime minister and police said five other men were assisting in separate investigations into a recent series of high-profile hacker attacks.
The Anti Phishing Working Group is now lending its expertise to the IRS to help root out online and offline phishing scams that use a combination of e-mails and faxes to steal identities.
A "DIY cyborg" has a surgically implanted chip that reads his body temperature and delivers the data to a mobile device. Warning: his subcutaneous sensor might make your own skin crawl.
A group of hackers, known as TeamBerserk, took credit on Twitter
Sophisticated attackers could soon adopt an innovative technique for bypassing one of the most effective mechanisms for preventing a Windows security breach, researchers say.
Rapid7 has acknowledged that it waited too long to take the security actions needed to prevent a pro-Palestine hacking group from taking down two of its websites by sending a fax to the sites' registrar.
And that is both a good and bad thing. The almost magical capabilities of mobile devices help workers to be vastly more productive and collaborative, while keeping them much more entertained and connected during their off hours. A self-driving car could, in different ways, do the same.
Security researchers Tuesday said reports of the arrest of the hacker behind Blackhole, one of the most widely used exploit kits on the Internet, is good news for IT operations and users. But it shouldn't be long before another hacker takes his place.
SOFTWARE titan Adobe Systems has warned that hackers breached its defences and stole source code along with credit card numbers and other information relating to nearly three million customers.
While the energy industry may fear the appearance of another Stuxnet on the systems they use to keep oil and gas flowing and the electric grid powered, an equally devastating attack could come from a much more mundane source: phishing.