Linux Hacks & Cracks - Page 38

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

State-Sponsored Hacker Gang Has a Side Gig in Fraud

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An elite group of nation-state hackers running roughshod through the financial sector and other industries in the U.S. has pioneered techniques that others are following, and has used sophisticated methods to go after hardened targets, including hacking a security firm to undermine the security service the company provided its clients.

Israeli

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the hacking world, it takes one to know one. For many corporations, the best defense against hackers is to actually hire a hacker and pay him or her to break into their sites or databases and expose weaknesses in a benign manner. There aren

Hacker Challenge: Hack Your Garage or Carport

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Welcome to our next Hacker Challenge! Each week, we issue a new challenge. You get until Sunday to prepare your submission and send it to us. That gives you a few days to think about it and a whole weekend to work it up. Our editors pick the best submissions and our favorite will be featured right here on Lifehacker!

Sudo Flaw Opens Potential Security Risk for OS X, Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security flaw in the command line tool sudo in OS X 10.7 and higher, as well as some Linux distributions, could give unauthorized root access to user's computers. The flaw was reported by Metasploit, a company that specializes in finding security issues and building utilities to point them out, but the steps needed to exploit this particular issue make it unlikely most Mac users will become victims before a patch is available.

Tesla Model S vulnerable to hackers?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Next time you walk by a parked Tesla and its sunroof is opening and closing with nobody sitting inside or around it, you could be witnessing a hacker moment. For all of its strengths as a car, the Model S reportedly has a weak spot: the security of its API (application programming interface) authentication, according to an article in the O'Reilly Community by George Reese, executive director of cloud management at Dell.