Security Projects - Page 24
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Want to learn how to remotely wipe address books and read private text messages on someone else's iPhone?
The Sony PS Vita has been attacked by the hacking community ever since it initially launched in Japan back in December of 2011. Hackers have been doing their best to break through the Sony PS Vita, and have been successful in getting through its security.
A team of Russian developers is touting a technology it says can kill off BitTorrent-based P2P file sharing
As security breaches continue to grow both in frequency and in the amount of damage they cause (according to Symantec, the average organization incurred $470,000 in losses from endpoint cyber attacks in 2011), penetration testing is becoming increasingly important for organizations of all sizes. For IT professionals seeking to expand their knowledge in that area, the EC-Council's Certified Ethical Hacker (CEH) credential offers a solid base of expertise.
You may not feel like the flotsam and jetsam that make up the facts of your life are important, but increasingly companies are using that dry data to make your every online step as indelible as if written in blood. Here's how to take back your digital dignity.
The next time an unexpected
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria
You probably don't interact with your PC's BIOS (Basic Input/Output Operating System) much, but it occupies a unique and highly privileged position in your computer's architecture.
Since Apache Maven, the brainchild of Sonatype founder Jason van Zyl, emerged as a top-level Apache Software Foundation project in 2003, the Central Repository has become a primary source of open source components. Jackson says the Central Repository receives four billion requests per year for its 300,000 components.
On Tuesday, a user who is known as "lawabidingcitizen" posted an unusual request to the Full Disclosure mailing list, a forum that is mainly used by the security community: "Please do not take down the Sality botnet."
A $1 million purse that Google has offered to hackers who can produce zero-day exploits against its Chrome browser appears to be safe after the first day of its three-day Pwnium hacking contest, which yielded just one contestant and one successful zero-day attack.
Modern data centres deploy firewalls and managed networking components, but still feel insecure because of crackers. Hence, there is a crucial need for tools that accurately assess network vulnerability. This article brings you the top 10 assessment tools to address these issues, categorised based on their popularity, functionality and ease of use.
In his seminal work The Cathedral and the Bazaar, Eric Raymond put forward the claim that
Trend Micro has published the source code of its free anti-malware tool, HijackThis (HJT), on Sourceforge under a GPLv2 licence. Trend Micro says it will be maintaining the original source code but also incorporating modifications from the community.
"Laughing at people talking about the internet decades ago" is one of our favorite video subgenres here at Gizmodo, and this specimen doesn't disappoint: a fatherly AT&T narrator explains the dangers of hackers. Look out! Your modem is under attack!
Do viruses, DDoS attacks, or buffer overflows tickle your fancy? If so, you might consider becoming a legal hacker, aka an ethical hacker, "white hat" hacker, or penetration tester.
They are long, hard to remember (even if you have easier-to-remember phrases), moreso when new, and are largely a difficulty for users to user properly. Combined with the fact that many users choose easy-to-guess or easy-to-ascertain passwords based off of commonly-known facts about themselves and that they will try all of their passwords when told one isn
One of the principle maintainers of the Linux kernel, Greg Kroah-Hartman, has joined the Linux Foundation as a fellow, the same position held by Linux creator Linus Torvalds, the foundation announced. Kroah-Hartman previously worked at Suse Linux, also as a fellow.
I am honoured to have been invited back to present at the prestigious e-Crime Congress to be held in London, March this year. However it caused a flash-back to the last occasion I presented at Congress in 2009, when things seemed to be very different.