Hacks/Cracks - Page 88.3

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Dirty tricks of hunt for al-Qaida cash

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It would be every computer hacker's dream. Working from home, playing the usual games, except this time breaking into computers alongside U.S. intelligence forces - hunting down Osama bin Laden's money through cyberspace. A German hacker claims his pals have done just that.. . .

EFF: New law will treat hackers as terrorists

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Legislation under consideration in the United States Congress to combat terrorism will treat low-level computer crimes as terrorist acts and threaten hackers with life imprisonment, according to officials of the civil liberties group Electronic Frontier Foundation (EFF). EFF says the Anti-Terrorism . . .

Hackers find bin Laden's accounts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of UK hackers claims to have captured confidential banking information on the wanted terrorist Osama bin Laden, and Al Qaeda, the organisation he heads up. According to 27-year-old millionaire Kim Schmitz, otherwise known as convicted hacker "Kimble", the group . . .

Cyber Attacks During the War on Terrorism

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This report analyzes the possibility of cyber attacks against U.S. and allied information infrastructures in response to anticipated military strikes against terrorists and nation-state sponsors. While many have speculated about the possibility for such cyber attacks, this report provides a detailed, . . .

New ads to target hackers, discourage cyber-retaliation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Vint Cerf, who helped develop the Internet's basic communications tools in the 1970s, said hackers "do not contribute in any constructive way to dealing with the many problems our global civilization faces." Keeping the Internet smoothly functioning, he said, "will at least offer a way for (the) collective expression of views and perhaps better understanding.". . .

'Happy Hacker' Drops A Bomb On Security Experts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On Wednesday, the 14,300-strong subscribers to a popular security list known as Vuln-Dev received what may have appeared a rare treat: a message to the list containing source code to a program that gave the user full control of a remote Unix system. But as some Vuln-Dev readers, many of whom are system administrators for businesses, painfully learned, the program was a Trojan horse, and if compiled and run, could delete most of the files on the user's computer.. . .

Hackers Discuss Retaliatory Cyberstrikes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although the U.S. government has yet to publicly identify suspects in Tuesday's terrorist attacks on America, some hackers are already plotting counterstrikes against Islamic Web sites, according to postings in Internet newsgroups. So far, the impact of the planned retaliatory hacking has been limited.. . .

Linux users in Trojan debate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Remote Shell Trojan, disclosed last week by vnunet.com, has sparked a storm of controversy among Linux devotees who are arguing fiercely over the degree of danger posed by the exploit. Users logging into slashdot.org to discuss vnunet.com's coverage have highlighted the sensitivity of the issue for the Linux community.. . .

FBI operation penetrates hacker underground

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI has gained a foothold in the hacker underground thanks to an 18-month undercover operation launched during the height of the U.S. military's 1999 bombing campaign in Kosovo. What started out as a Defense Department operation designed to ferret out . . .

Security survey to measure awareness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Relatively short article, but shows that Social Engineering still is a legitimate threat to organizations. "When Chris Pick and Todd Tucker want to demonstrate to a client how vulnerable its system is, they often just put on a pair of overalls and pick up a tool box.. . .

Linux based Trojan gets a closer look

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In light of the interest in the recently discovered Linux based Remote Shell Trojan, vnunet.com has uncovered more details of the worm's functionality in a bid to dispel any fear, uncertainty and doubt. Security experts analysing the Trojan have said that . . .

New Unix worm could be next Code Red

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new Internet worm designed to attack a common flaw in Unix systems has been confirmed dead, but security experts are warning that the self-propagating worm could be the next Code Red. The X.C worm exploits a newly discovered hole in the telnet service that is run on most Unix systems.. . .

XP Cracks Appear Before Product

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In Microsoft's battle against software piracy, the first round goes to pirates, even though the starting bell hasn't even rung yet. Microsoft's new operating system, Windows XP, won't be in stores for another seven weeks, but pirated copies are already floating . . .

Study: Many UK businesses prey to cybercrime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cybercrime is on the rise in the UK and for the first time, those businesses that are hit by hacks are more likely to be attacked by hackers from outside of the company instead of inside, according to a study published Wednesday by the Confederation of British Industry (CBI).. . .

US government re-issues telnet warning

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A warning has been re-issued by the National Infrastructure Protection Centre (NIPC) about a vulnerability in the telnet daemon program following "numerous reports" of intruders exploiting the hole. The NIPC, part of the US government, also fears that users may face . . .

Hack attacks on home PCs increase

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Home PCs are coming under increasing threat from intruders, and those on broadband connections are the most vulnerable, according to CERT The last three months have seen a significant rise in so-called intruder attacks directed at home users, . . .

Teaching job for hacker

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer hacker Andrew Garrett will teach "mature members of the community" basic computer and internet surfing skills, following his sentencing for computer-related crimes.. . .