Hacks/Cracks - Page 88.3
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
It would be every computer hacker's dream. Working from home, playing the usual games, except this time breaking into computers alongside U.S. intelligence forces - hunting down Osama bin Laden's money through cyberspace. A German hacker claims his pals have done just that.. . .
Legislation under consideration in the United States Congress to combat terrorism will treat low-level computer crimes as terrorist acts and threaten hackers with life imprisonment, according to officials of the civil liberties group Electronic Frontier Foundation (EFF). EFF says the Anti-Terrorism . . .
A group of UK hackers claims to have captured confidential banking information on the wanted terrorist Osama bin Laden, and Al Qaeda, the organisation he heads up. According to 27-year-old millionaire Kim Schmitz, otherwise known as convicted hacker "Kimble", the group . . .
This report analyzes the possibility of cyber attacks against U.S. and allied information infrastructures in response to anticipated military strikes against terrorists and nation-state sponsors. While many have speculated about the possibility for such cyber attacks, this report provides a detailed, . . .
Vint Cerf, who helped develop the Internet's basic communications tools in the 1970s, said hackers "do not contribute in any constructive way to dealing with the many problems our global civilization faces." Keeping the Internet smoothly functioning, he said, "will at least offer a way for (the) collective expression of views and perhaps better understanding.". . .
There was much mocking in the Linux camp this weekend when it was discovered that the Sir Cam virus will run under the Open Source operating system - but only under the Wine Windows emulator.. . .
On Wednesday, the 14,300-strong subscribers to a popular security list known as Vuln-Dev received what may have appeared a rare treat: a message to the list containing source code to a program that gave the user full control of a remote Unix system. But as some Vuln-Dev readers, many of whom are system administrators for businesses, painfully learned, the program was a Trojan horse, and if compiled and run, could delete most of the files on the user's computer.. . .
In a move that could ignite hacker tensions, the founder of a group called the Pakistan Hackerz Club today defaced the Web site of World Trade Services, a California-based firm that facilitates international e-commerce. In a message left at the . . .
Alldas.de, the well known defacement archive, is once again looking for a home after a deal to move from its ISP fell through in the wake of a debilitating hack attack. Three weeks ago, Alldas was subjected to a week-long distributed . . .
Although the U.S. government has yet to publicly identify suspects in Tuesday's terrorist attacks on America, some hackers are already plotting counterstrikes against Islamic Web sites, according to postings in Internet newsgroups. So far, the impact of the planned retaliatory hacking has been limited.. . .
The Remote Shell Trojan, disclosed last week by vnunet.com, has sparked a storm of controversy among Linux devotees who are arguing fiercely over the degree of danger posed by the exploit. Users logging into slashdot.org to discuss vnunet.com's coverage have highlighted the sensitivity of the issue for the Linux community.. . .
The FBI has gained a foothold in the hacker underground thanks to an 18-month undercover operation launched during the height of the U.S. military's 1999 bombing campaign in Kosovo. What started out as a Defense Department operation designed to ferret out . . .
Relatively short article, but shows that Social Engineering still is a legitimate threat to organizations. "When Chris Pick and Todd Tucker want to demonstrate to a client how vulnerable its system is, they often just put on a pair of overalls and pick up a tool box.. . .
In light of the interest in the recently discovered Linux based Remote Shell Trojan, vnunet.com has uncovered more details of the worm's functionality in a bid to dispel any fear, uncertainty and doubt. Security experts analysing the Trojan have said that . . .
A new Internet worm designed to attack a common flaw in Unix systems has been confirmed dead, but security experts are warning that the self-propagating worm could be the next Code Red. The X.C worm exploits a newly discovered hole in the telnet service that is run on most Unix systems.. . .
In Microsoft's battle against software piracy, the first round goes to pirates, even though the starting bell hasn't even rung yet. Microsoft's new operating system, Windows XP, won't be in stores for another seven weeks, but pirated copies are already floating . . .
Cybercrime is on the rise in the UK and for the first time, those businesses that are hit by hacks are more likely to be attacked by hackers from outside of the company instead of inside, according to a study published Wednesday by the Confederation of British Industry (CBI).. . .
A warning has been re-issued by the National Infrastructure Protection Centre (NIPC) about a vulnerability in the telnet daemon program following "numerous reports" of intruders exploiting the hole. The NIPC, part of the US government, also fears that users may face . . .
Home PCs are coming under increasing threat from intruders, and those on broadband connections are the most vulnerable, according to CERT The last three months have seen a significant rise in so-called intruder attacks directed at home users, . . .
Computer hacker Andrew Garrett will teach "mature members of the community" basic computer and internet surfing skills, following his sentencing for computer-related crimes.. . .