Hacks/Cracks - Page 128.75

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

the fifth estate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In its investigative documentary, Hackers, the fifth estate explores the inherent tension between the convenience and speed with which people conduct their personal, social and corporate affairs via the internet, and the high price in personal security exacted by the technology . . .

Security Firm's Site Defaced

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Crackers have entered and defaced two websites belonging to Network Associates, the company that bills itself as the world's largest independent network security company. The intruders splattered a montage of bilingual cyber-graffiti over two of the company's Brazilian-based websites, www.nai.com.br and . . .

Companies strike back at mobile hacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hackers beware! If you think the telecommuters at Lexis-Nexis are easy targets, you'd better think again. These telecommuters are not the kinds who disable anti-virus software to download the latest version of Napster, thereby creating holes that hackers can use to . . .

Increased Cybercrime Is A Holiday Threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal officials are advising e-commerce sites to tighten security because of a recent increase in cyberattacks. The FBI's National Infrastructure Protection Center (NIPC) on Friday said it recently has seen an increase in hacker activity targeting U.S. systems associated with e-commerce . . .

Schwab site vulnerable to hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Charles Schwab & Co.'s Web site is vulnerable to a well-known attack that could allow a hacker to gain access to sensitive account information, the financial services company acknowledged Wednesday. Reported by San Francisco-based programmer Jeff Baker on the Bugtraq security . . .

Can hackers crack million-dollar dare?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An Australian company, that claims to have developed the ultimate security-proof system, will soon issue a multi-million dollar dare to the hacking underworld. With a 30-day deadline, the challenge to crack Secure Systems' Silicon Data Vault technology will . . .

Meet the Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Not all hackers are bad guys. But understanding what motivates them can make you less vulnerable to an attack. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities. Hackers also relish the intellectual challenge . . .

Does Attrition Foster Web Defacements?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A big topic on the Internet is web page defacements. The term "defacement" or "web graffiti" refer to an incident when someone gains unauthorized access and alters the index page of that particular violated site. Usually the replaced index resembles the . . .

No ban on hacking tools

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Council of Europe has dropped proposals to outlaw the use of "hacking" tools by IT departments, following an intense lobbying campaign by businesses. The proposals were contained in the Council of Europe's Convention on Crime in Cyberspace, which aims to . . .

Hacker's Prison ID card on Sale

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A celebrity computer hacker gained more notoriety after three online auction sites posted then removed from sale his prison ID card. The ID card of Kevin Mitnick is being offered on start-up auction site DutchBid.com after being rejected by Amazon.com, Yahoo! . . .

Any port is a hacker storm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Central to [the SYN] attack is the ability of the miscreant to find an "open" port - that is, a port on the destination machine that responds to connection requests. If a hacker is trying to find your weaknesses, he will . . .

Sleaze Bay: Scams Online

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An educated consumer is a safe consumer. In that spirit, here is Forbes ASAP's complete guide to the dark side of online auction trading. "The average person who uses eBay is just completely ignorant," says one frequent seller (who, like . . .

Hacking With a Conscience Is a New Trend

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... more and more hackers are using their tricks to spread socially conscious messages, security experts say. The trend -- dubbed "hacktivism" -- has shown up in a number of recent incidents: -- On Election Day, a Democrat hacked the Republican . . .

Tapping on the walls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. In this month's Building Blocks of Security, Sandra Henry-Stocker shows you how to stay one step ahead of . . .

Holding back hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Businesses are starting to realize that while the new economy requires the Internet, it also requires protection from those who take pleasure or profit sneaking into a company's electronic recesses. "I think a lot of people don't understand that with . . .

EPIC: Carnivore not as selective as FBI said

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Carnivore, the Federal Bureau of Investigation's e-mail surveillance software, is capable of capturing "all unfiltered traffic," despite assurances from the FBI this summer that the program only captures e-mails going to people on whom the FBI has a warrant.. . .

Bug-hunters say security holes go unheeded

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Experts say companies are failing to respond to security alerts, describing the laissez-faire -- or just plain lazy -- attitude as 'irresponsible.' Major software firms may be neglecting security vulnerabilities and putting their users at serious risk, according to bug-hunters at . . .