Hacks/Cracks - Page 128
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The widespread fear of a concerted distributed denial of service (DDoS) attack over the holiday season thankfully failed to materialise, but security experts are still at odds over how serious the threat was. Fears about an attack similar to that which . . .
Web site defacement has come within the reach of everyday Internet users after a computer cracker known for defacing UK Web sites launched a scheme allowing anyone to take part in Web graffiti. The cracker -- known as Evil Angelica -- . . .
Bill Clinton announced December 31 that the United States is signing the 1998 Rome Treaty on the International Criminal Court, but said he will recommend that President-elect George W. Bush not submit the treaty to the Senate until "fundamental concerns are . . .
Although Microsoft Corp. has denied that the hacker who penetrated its network in October gained access to any of the company's source code, a recent report by a Washington-based think tank is warning that the compromise may hold grave national security . . .
This is a newsletter delivered to you by Help Net Security. It covers weekly roundups of security events that were in the news the past week. Visit Help Net Security for the latest security news. Issues covered include general . . .
In February, computer hackers demonstrated that even the biggest Internet companies remain vulnerable to basic forms of attack, combining an age-old denial of service technique with new tools to cripple CNN, Amazon, eBay and Yahoo!. In the space . . .
Online electronics and computer retailer Egghead.com acknowledged Friday that the company's servers were hacked by network intruders and an undetermined number of credit cards numbers were potentially stolen. "Egghead.com has discovered that a hacker has accessed our computer systems, potentially including . . .
I met the mysterious Doctor Mudge on the doorstep of Bob Metcalfe's townhouse on Beacon Street in the fashionable Back Bay area of Boston. You've probably heard about Metcalfe -- he invented Ethernet, among other things -- but you might not . . .
Security pros use HoneyNet Project to learn tricks of the hacking trade --and raise corporate awareness. When a group of suspected Pakistani hackers broke into a U.S.-based computer system in June, they thought they had found a vulnerable network to use . . .
Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. In this month's Building Blocks of Security, Sandra Henry-Stocker shows you how to stay one step ahead of . . .
eWEEK analyzes the year's 10 brightest and most challenging moments in IT. If put to a vote, 2000 would have to be considered the most interesting, if not the most eventful, year of technology ever. Internet security, B2B vs. B2C and . . .
Year 2000 is ending as it began, with a DDoS attack threatening a large part of the Internet and failing security efforts fueling IT fears. The latest distributed denial-of-service attempt was broken up last week in Denmark, where hackers took control . . .
This very well could be a bigger threat than you might realize. "For Elite Web Hosting in Orlando, Fla., September, 2000, was a nightmare. A disgruntled former employee allegedly hacked into the company's computer system without authorization. He then allegedly sent . . .
One year ago, computer hacking still seemed a novelty to most Americans. So what if the White House Web site could be defaced? But this year, computer criminals crept into everyday life. Now we know they have the power to shut . . .
A team of cryptography experts plan to combat government email surveillance plans through a new super-secure operating system dubbed M-o-o-t. The fedgling project has the backing of top cryptographers and is designed to tackle the Regulation of Investigatory . . .
In its investigative documentary, Hackers, the fifth estate explores the inherent tension between the convenience and speed with which people conduct their personal, social and corporate affairs via the internet, and the high price in personal security exacted by the technology . . .
Crackers have entered and defaced two websites belonging to Network Associates, the company that bills itself as the world's largest independent network security company. The intruders splattered a montage of bilingual cyber-graffiti over two of the company's Brazilian-based websites, www.nai.com.br and . . .
Hackers beware! If you think the telecommuters at Lexis-Nexis are easy targets, you'd better think again. These telecommuters are not the kinds who disable anti-virus software to download the latest version of Napster, thereby creating holes that hackers can use to . . .
Federal officials are advising e-commerce sites to tighten security because of a recent increase in cyberattacks. The FBI's National Infrastructure Protection Center (NIPC) on Friday said it recently has seen an increase in hacker activity targeting U.S. systems associated with e-commerce . . .
Charles Schwab & Co.'s Web site is vulnerable to a well-known attack that could allow a hacker to gain access to sensitive account information, the financial services company acknowledged Wednesday. Reported by San Francisco-based programmer Jeff Baker on the Bugtraq security . . .