Linux Hacks & Cracks - Page 46
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
NASA's Mars rover 'Curiosity' might be facing a hacking threat from the notorious hacker group, Anonymous, a US security firm has claimed.
Gen. Keith B. Alexander, the director of the National Security Agency, asked hackers for help securing cyberspace when he spoke at the Defcon conference late last month.
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.
A disgruntled former employee of Texas Auto Center chose a creative way to get back at the Austin-based dealership: He hacked into the company's computers and remotely activated the vehicle-immobilization system, which triggered the horn and disabled the ignition system in more than 100 of the vehicles.
An anonymous hacker has found a security hole in the Nvidia binary. He or she allegedly reported it to Nvidia "over a month ago" and did not receive a reply, nor was the flaw ever patched. The exploit has now been made public.
Cloud storage service provider Dropbox has acknowledged that a file containing private customer data was stolen from the Dropbox account of one of the company's employees and that the information was subsequently used to send out spam messages to users.
"Hacking [redacted] Routers" was the title of a lecture at Defcon by security expert Felix Lindner (also known as FX) and Gregor Kopf of the Berlin-based Recurity Labs. The "censored" routers were quickly established as being the AR18 and AR28 routers from the Chinese manufacturer Huawei.
A researcher scored again against Oracle
HACKERS have stolen customer data from the internet company AAPT to highlight the dangers of a proposal to force telcos to store every Australian's web history for up to two years.
Analysts say infiltrating the scoring and timing systems at one of the 35 competition venues around Britain, especially the Olympic stadium in east London, is a target for hackers looking to spread political messages, known as 'hacktivists', and criminal gangs looking to cash in on the Games.
The next time you stay in a hotel room, run your fingers under the keycard lock outside your door. If you find a DC power port there, take note: With a few hacker tricks and a handful of cheap hardware, that tiny round hole might offer access to your room just as completely as your keycard.
Estonian hacker Aleksandr Suvorov has been sentenced to seven years in prison for his role in two hacking schemes that involved more than 240,000 stolen credit card numbers.
Spammers are currently sending large volumes of spam to users of cloud storage service provider Dropbox. The H's associates at heise Security have so far received four different pieces of German-language spam at an email address used solely to register with Dropbox, and some of their readers have reported the same problem; similar reports can also be found on the Dropbox forums. In almost all cases, the spam is for suspicious-looking online casinos.
The security of high-end handcuffs depends on a detainee not having access to certain small, precisely-shaped objects. In the age of easy 3D printing and other DIY innovations, that assumption may no longer apply.
Phandroid, a popular Android news site, has confirmed that its Android Forums web site was compromised and that private user data has been accessed. According to Phandroid's notice about the security breach, the user table of Android Forum's database was accessed by unknown intruders using a known exploit, which has since been fixed.
As 450,000 passwords exposed, Yahoo fails security 101 -- If it wasn't clear before, it certainly is now: Your username and password are almost impossible to keep safe.
A Java applet determines whether the victim's machine is running Windows, Mac or Linux, then downloads the appropriate malware for the platform. Researchers at F-Secure have uncovered a new Web-based attack that installs backdoors on Windows, Linux and Mac OS X computers.
A hacker claims to have breached and backdoored security and antivirus software firm Trend Micro due to 'pseudo-security' as well as SYKES which runs support services for Trend Micro. According to Pastebin and a dump for 'proof' of the breach, the hacker claims to still be in control of a backdoor into the security firm.