Linux Hacks & Cracks - Page 42
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Beyonce and voodoo have been ruled out as potential culprits in the bizarre 33-minute blackout during last night's Super Bowl. But what about hackers? It took just a few minutes after the lights went out in the Superdome for hackers to begin hinting they had something to do with it. "#TangoDown Superbowl XLVII," tweeted the most popular Twitter account of the hacktivist collective Anonymous. It's an outlandish claim and almost certainly a troll. But it's possible, and here's how it might have happened.
Like many industry innovations, BYOD offers as much opportunity for wily cyber-thieves as it does for corporate efficiency. Unless enterprises ratchet up their level of vigilance, 2013 is poised to become the most destructive year on record. That will play out in four main areas:
Before smartphones and iPads, before the internet or the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world
Hackers behind a recently detected email attack campaign are exploiting a vulnerability in a Yahoo website to hijack the email accounts of Yahoo users and use them for spam, according to security researchers from antivirus vendor Bitdefender.
Following a string of revelations this week from several media companies who announced they had been recently hacked, Twitter announced on Friday that it had also been the target of a sophisticated attack.
For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.
During an IP scan of all possible IPv4 addresses, Rapid7, the security firm that is known for the Metasploit attack framework, has discovered 40 to 50 million network devices that can potentially be compromised remotely with a single data packet.
Digital video recorders have revolutionized home and business security, making it possible to easily store and play back hundreds of hours of surveillance camera footage. But a few design flaws in their software, it seems, can quickly turn the watchers into the watched.
Serial Java fault-finder Adam Gowdiak has embarrassed Oracle yet again. Gowdiak hit the headlines last year when he reported a vulnerability, waited for Oracle's response, and then upped the ante with a comeback vuln.
We all know we should be careful transacting online, but are you thinking about cyber-security when you
If you work in an office that uses the popular CiscoUnified IP Phone 7900 Series, prepare to feel violated. A couple of security researchers have published details on a security vulnerability that allows a nefarious hacker to turn the phones into eavesdropping devices. The hack allows people to listen in on private phone calls as well as to nearby conversations.
An ongoing multibillion-dollar overhaul of the nation's air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025.
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions -- thought by some to be the work of Iran -- are using botnets for hire.
The developers of Ruby on Rails are calling on users to update their Rails installations as soon as possible, following the public disclosure of flaws in the parsing of XML-formatted parameters in the Rails framework. The update also fixes an unrelated issue with JSON parameter parsing.
Nintendo better hire a decent sea monster to help them fight off a potential onslaught of 3DS pirates. 3DS hacker Neimod has revealed that he has gained full control of a 3DS kernel that enables the device to run custom code, according to GBAtemp.net. Such code will open the handheld to independently created home-brew software and pirated games.
Facebook Inc. (FB) has patched a security vulnerability that would have allowed hackers to turn on users
Hacking an iOS device may be getting tougher to do. Per iPodNN, in a recent tweet, hacker i0n1c has revealed that the forthcoming iOS 6.1 update adds
Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required no password and allowed direct access to the control system. "[Th]e published backdoor URL provided the same level of access to the company's control system as the password-protected administrator login," said the memo.
A malicious Apache module found operating in the wild turns sites running the Internet's most popular Web server into platforms that surreptitiously install malware on visitors' computers.