Hacks/Cracks - Page 88.3

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Anti-Hacking premiums 25% higher for Win NT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An insurance policy against hacker-inflicted damage costs 25 per cent more for companies using Windows NT. This is because "there are so many security holes in Microsoft products", John Wurzler, of Wurzler underwriting managers, told us today. Wurzler's stance could be . . .

From Teen Hackers to Job Hunters

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At age 3, Patrick Roanhouse got his first computer. At 7, he figured out how to construct a modem out of scrap parts. By 14, he was running around cyberspace under the alias "Anarchist" and working up all sorts of havoc. Then he met the 2600 Club.. . .

Hack attacks: Who's to blame?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Malicious intruders, corporate espionage and uneducated employees all contribute to make "network security" almost an oxymoron in today's wired world, four security experts agreed at the RSA Data Security Conference. But the lack of security on corporate networks and the Internet . . .

The Hacker Did Us a Favor

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"CyberCrime's" cohost asks if hackers help make the Internet more secure. "Aren't you angry that someone broke into a computer system and downloaded your personal information?" I asked Gould. He replied, with a slight grin, "No, not really. I think in this particular case the hacker did us a favor." Gould blames the University of Washington rather than the hacker. . . .

Cracks Happen; Protect Thyself

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The various seminars and exhibits at the computer security show here occupy not only an entire wing of the Moscone Convention Center, but also the 15 movie theaters across the street at Sony's Metreon entertainment complex. The RSA Conference is huge; . . .

Hacking group spills the beans

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

vnunet talks to hacking group World of Hell. What's your motivation for hacking? Personal, political, to prove a point about security issues or just for fame/infamy? Rubix: Well, I myself am 'hacking' to get media attention, and would be known in . . .

Meet the `cyber avengers'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kris Haworth, head of the computer forensics lab at Deloitte and Touche in San Francisco, runs one of a growing number of private forensics labs. Kris Haworth pounded away at her keyboard, navigating a labyrinth of computer data in her search . . .

Hacking for fun, not profit, mischief

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Baker, a 24year old systems programmer, is part of a group of computer experts who spend their free time trying to figure out potential Internet security threats to large networks. Over the last year, Baker's hobby has led him to technology . . .

Cypherpunk's Free Speech Defense

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Jim Bell took the witness stand in federal court on Friday to argue he was attempting to document illegal behavior, not stalk government agents. Bell described his electronic research last year -- which the Justice Department says led federal agents to . . .

Cybersleuths find growing role in fighting crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Using data-mining and tracking software so powerful that they once qualified as government secrets, she found what the directors were looking for. The Securities and Exchange Commission was notified and criminal indictments against several executives followed. Haworth, who runs Deloitte & . . .

Answering a CEO's penetrating question

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Don't worry, Boss, our security is solid." "How can you be sure? Have we ever tested it?" Suddenly, you're faced with the delicate task of finding someone to do a coherent penetration test on your enterprise. But where do you begin? . . .

Three Minutes With Hacker 'Fosdick'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fosdick, who goes by various names online, is a 27-year-old hacker who works as a programming engineer. He began hacking at age 10 after his father, a prominent judicial official in the East Coast city where he grew up, bought him . . .

The phantom cyber-threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are you under 30? If so, jokes former National Security Advisor Anthony Lake in his book "Six Nightmares," chances are you have enough technical know-how to be a cyber-threat. And if you don't, says Lake, you can find everything you need, . . .

Hacker Speak

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Don't know a buffer overflow from a script kiddie? Here's your guide to understanding all the talk about computer security. Hackers and members of the Internet security industry, like workers in other specialty trades, have their own form of shop talk. . . .

Start-up offers $10,000 reward to hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The antivirus industry lambasted e-mail firewall start-up GateKeeper on Monday, after the company announced a reward for any virus writer who can infect a specific computer protected by its product. "It is probably one of the most irresponsible things that someone could do," said Vincent Gullotto, director of the Antivirus Emergency Response Team for security services company Network Associates. . . .

New cloaked-code threat to security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new technique for disguising programs aimed at cracking corporate networks could raise the stakes in the heated battle between hackers and security experts. During a seminar last week at the CanSecWest conference in Vancouver, British Columbia, a hacker named "K2" . . .

High-profile defacements today

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Today's been a busy day for defacers. Among the companies defaced today alone are the Walt Disney Company, the Wall St. Journal, Toyota, HSBC, the US Navy, the US Army, World Online, the ASPCA, Mercedes-Benz, and the official web page of the Ringling Bros. and Barnum & Baily Circus.. . .