Hacks/Cracks - Page 88.3
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
An insurance policy against hacker-inflicted damage costs 25 per cent more for companies using Windows NT. This is because "there are so many security holes in Microsoft products", John Wurzler, of Wurzler underwriting managers, told us today. Wurzler's stance could be . . .
At age 3, Patrick Roanhouse got his first computer. At 7, he figured out how to construct a modem out of scrap parts. By 14, he was running around cyberspace under the alias "Anarchist" and working up all sorts of havoc. Then he met the 2600 Club.. . .
Malicious intruders, corporate espionage and uneducated employees all contribute to make "network security" almost an oxymoron in today's wired world, four security experts agreed at the RSA Data Security Conference. But the lack of security on corporate networks and the Internet . . .
"CyberCrime's" cohost asks if hackers help make the Internet more secure. "Aren't you angry that someone broke into a computer system and downloaded your personal information?" I asked Gould. He replied, with a slight grin, "No, not really. I think in this particular case the hacker did us a favor." Gould blames the University of Washington rather than the hacker. . . .
The various seminars and exhibits at the computer security show here occupy not only an entire wing of the Moscone Convention Center, but also the 15 movie theaters across the street at Sony's Metreon entertainment complex. The RSA Conference is huge; . . .
vnunet talks to hacking group World of Hell. What's your motivation for hacking? Personal, political, to prove a point about security issues or just for fame/infamy? Rubix: Well, I myself am 'hacking' to get media attention, and would be known in . . .
Kris Haworth, head of the computer forensics lab at Deloitte and Touche in San Francisco, runs one of a growing number of private forensics labs. Kris Haworth pounded away at her keyboard, navigating a labyrinth of computer data in her search . . .
Baker, a 24year old systems programmer, is part of a group of computer experts who spend their free time trying to figure out potential Internet security threats to large networks. Over the last year, Baker's hobby has led him to technology . . .
Jim Bell took the witness stand in federal court on Friday to argue he was attempting to document illegal behavior, not stalk government agents. Bell described his electronic research last year -- which the Justice Department says led federal agents to . . .
Using data-mining and tracking software so powerful that they once qualified as government secrets, she found what the directors were looking for. The Securities and Exchange Commission was notified and criminal indictments against several executives followed. Haworth, who runs Deloitte & . . .
"Don't worry, Boss, our security is solid." "How can you be sure? Have we ever tested it?" Suddenly, you're faced with the delicate task of finding someone to do a coherent penetration test on your enterprise. But where do you begin? . . .
The feeling you get in the pit of your stomach when you first suspect that your site has been cracked is similar to the feeling you get when you first discover your house has been broken into. It is a sickening sense of muted outrage.. . .
Fosdick, who goes by various names online, is a 27-year-old hacker who works as a programming engineer. He began hacking at age 10 after his father, a prominent judicial official in the East Coast city where he grew up, bought him . . .
According to the word police, there's a difference But after 15 years watching the computer elite trying unsuccessfully to enforce a distinction, Henry Kingman has a word of advice: Just give it a rest! . . .
Are you under 30? If so, jokes former National Security Advisor Anthony Lake in his book "Six Nightmares," chances are you have enough technical know-how to be a cyber-threat. And if you don't, says Lake, you can find everything you need, . . .
The third Linux virus in almost as many months hit the Internet this week. Known as the Adore worm, the program is designed to create so-called back doors in the security of Linux systems and send information identifying the compromised systems . . .
Don't know a buffer overflow from a script kiddie? Here's your guide to understanding all the talk about computer security. Hackers and members of the Internet security industry, like workers in other specialty trades, have their own form of shop talk. . . .
The antivirus industry lambasted e-mail firewall start-up GateKeeper on Monday, after the company announced a reward for any virus writer who can infect a specific computer protected by its product. "It is probably one of the most irresponsible things that someone could do," said Vincent Gullotto, director of the Antivirus Emergency Response Team for security services company Network Associates. . . .
A new technique for disguising programs aimed at cracking corporate networks could raise the stakes in the heated battle between hackers and security experts. During a seminar last week at the CanSecWest conference in Vancouver, British Columbia, a hacker named "K2" . . .
Today's been a busy day for defacers. Among the companies defaced today alone are the Walt Disney Company, the Wall St. Journal, Toyota, HSBC, the US Navy, the US Army, World Online, the ASPCA, Mercedes-Benz, and the official web page of the Ringling Bros. and Barnum & Baily Circus.. . .