Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A music and technology forum that ran a $10,000 contest back in September challenging people to hack into copyright protection technologies said on Tuesday it was paying prize money to two hackers. The Secure Digital Music Initiative (SDMI) said it was . . .
Central to [the SYN] attack is the ability of the miscreant to find an "open" port - that is, a port on the destination machine that responds to connection requests. If a hacker is trying to find your weaknesses, he will . . .
I've been trying to install Linux because more and more hacker tools seem to be available for it. The combination of power, flexibility and the open-source community seems to be very attractive to hackers. Web sites such as the Nomad Mobile . . .
An educated consumer is a safe consumer. In that spirit, here is Forbes ASAP's complete guide to the dark side of online auction trading. "The average person who uses eBay is just completely ignorant," says one frequent seller (who, like . . .
... more and more hackers are using their tricks to spread socially conscious messages, security experts say. The trend -- dubbed "hacktivism" -- has shown up in a number of recent incidents: -- On Election Day, a Democrat hacked the Republican . . .
Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. In this month's Building Blocks of Security, Sandra Henry-Stocker shows you how to stay one step ahead of . . .
Businesses are starting to realize that while the new economy requires the Internet, it also requires protection from those who take pleasure or profit sneaking into a company's electronic recesses. "I think a lot of people don't understand that with . . .
Carnivore, the Federal Bureau of Investigation's e-mail surveillance software, is capable of capturing "all unfiltered traffic," despite assurances from the FBI this summer that the program only captures e-mails going to people on whom the FBI has a warrant.. . .
X-Force, the research and development (R&D) team of Internet Security Systems (ISS), has warned that hackers are planning an online attack-fest this coming Christmas. The attacks, if they occur, will take the form of distributed denial of service (DDOS) invasions, a . . .
Experts say companies are failing to respond to security alerts, describing the laissez-faire -- or just plain lazy -- attitude as 'irresponsible.' Major software firms may be neglecting security vulnerabilities and putting their users at serious risk, according to bug-hunters at . . .
Big-mouthed hackers to come a cropper Services giant EDS last week said it knew about recent denial-of-service attacks two months before they happened, and had even identified the tools the crackers were planning to use. Speaking in Las Vegas . . .
Politics Web site Policy.com late this morning was cracked by unknown assailants who replaced the home page with one of their own, and told the site's operators that they did it to alert Policy.com to its own security vulnerabilities, and not . . .
Internet security researchers have warned that hackers are planning to launch internet-based denial of service (DoS) attacks on web retailers over the Christmas period.
Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as . . .
There's a war brewing in cyberspace. Make that a Netwar, so dubbed in Countering the New Terrorism, a book published last year by The RAND Corp., a Santa Monica, Calif.-based nonprofit research group formed during World War II.. . .
The online world has entered a new phase. At first it was a combination playground, library and meeting house for scientists and soldiers, an inviolate virtual world. Companies later tried to turn it into a mall. Now, it's becoming a borderless . . .
After the huge success of presenting the course in Malaysia and recently in South Africa, the Nanoteq Training Academy is again offering its Applied Hacking Techniques course to the industry. The course has been designed to give insight into the minds . . .
Bashing Microsoft Corp. may be popular sport on some issues, but the internal security breach that the company disclosed late last month has some corporate information technology users waxing sympathetic. Several users last week said the incident -- in which a . . .
A coalition of companies in the software and recording industries declared yesterday that three of five technologies aimed at stopping the online piracy of music had so far survived attack by hackers seeking to win $10,000 for cracking the security measures. . . .
Politicians may not pander to them and experts may discount their opinions, but online vandals are getting the message out about what they think is important: Increasingly, that's politics. On the eve of the U.S. elections, vandals defaced the home pages . . .