Linux Hacks & Cracks - Page 38
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
With two lockscreen holes and a fingerprint sensor that can be fooled with woodglue, we thought we'd given diehard iPhone fans a horse that was already dangerously high enough for them not to get down from.
A group of German hackers claimed to have cracked the iPhone fingerprint scanner on Sunday, just two days after Apple launched the technology that it promises will better protect devices from criminals and snoopers seeking access.
Hackers are gearing up for Friday's iPhone 5S release with a contest to crack the device's first-ever fingerprint scanner, a high-tech feature that Apple Inc says makes users' data more secure.
An elite group of nation-state hackers running roughshod through the financial sector and other industries in the U.S. has pioneered techniques that others are following, and has used sophisticated methods to go after hardened targets, including hacking a security firm to undermine the security service the company provided its clients.
In the hacking world, it takes one to know one. For many corporations, the best defense against hackers is to actually hire a hacker and pay him or her to break into their sites or databases and expose weaknesses in a benign manner. There aren
Welcome to our next Hacker Challenge! Each week, we issue a new challenge. You get until Sunday to prepare your submission and send it to us. That gives you a few days to think about it and a whole weekend to work it up. Our editors pick the best submissions and our favorite will be featured right here on Lifehacker!
The German subsidiary of British mobile operator Vodafone has been attacked by a hacker, who has reportedly stolen a huge amount of customer data. Police suspect that a contracted IT specialist carried out the attack.
A security flaw in the command line tool sudo in OS X 10.7 and higher, as well as some Linux distributions, could give unauthorized root access to user's computers. The flaw was reported by Metasploit, a company that specializes in finding security issues and building utilities to point them out, but the steps needed to exploit this particular issue make it unlikely most Mac users will become victims before a patch is available.
Your smartphone is probably a much more tempting target for cybercriminals than your desktop computer, and unless you take proper precautions, it's easier to hack as well.
Taking NATO down for a week in 1999 put Serbian hackers on the map. This weekend the Balkan Computer Congress puts Balkan hackers firmly on the global stage at the first-ever Balkan hacker conference.
As Gottfrid Svartholm tries to have a hacking conviction against him overturned, the Court of Appeal has been hearing evidence from hacker Jacob Appelbaum. Appearing on behalf of the defense, the former Wikileaks spokesman criticized the police investigation carried out on Gottfrid
s cars become more like PCs on wheels, what's to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine
Blaine Bublitz, a security researcher used a JavaScript program called node.js. to control a robot through Google Glass. Bublitz, managed to turn the wearable device into a control system for a Parrot AR drone.
Next time you walk by a parked Tesla and its sunroof is opening and closing with nobody sitting inside or around it, you could be witnessing a hacker moment. For all of its strengths as a car, the Model S reportedly has a weak spot: the security of its API (application programming interface) authentication, according to an article in the O'Reilly Community by George Reese, executive director of cloud management at Dell.
The always-on devices show what may be possible in the future of the Internet of Things but also highlight the dangers. As a Google Explorer, Anthony Pettenon wears his enthusiasm for technology on his face.
Officials for the moment say they cannot pinpoint anything malicious about the extraordinary outage of the Nasdaq stock exchange earlier today.
The details, which appear to be genuine, do not include passwords. They do include OAuth tokens, though, so Twitter users should probably revoke and re-establish access to connected third-party apps.
Chinese hackers are using an automated tool to exploit known vulnerabilities in Apache Struts, in order to install backdoors on servers hosting applications developed with the framework.
A Palestinian information system expert says he was forced to post a bug report on Mark Zuckerberg