Hacks/Cracks - Page 130.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Computer hackers with political agendas have become a fast-growing threat to big companies worldwide, a corporate intelligence company said on Thursday. "The methods they are using are in their infancy," said Kent Anderson of Control Risks Group, an international business risk . . .
High-tech thieves and industrial spies seem like the makings for the next John Grisham novel, but the folks over at the Cyber Group Network Corp. take cyber theft very seriously. The company's subsidiary, Cyber Crime Corp., today unveiled its revolutionary E-Snitch . . .
As a growing interest in online voting emerges and companies like Election.com have completed several mostly-successful medium-scale elections online, an Internet voting service is inviting hackers from around the world to test its particular system's defenses.. . .
Network security becomes increasingly difficult as point-and-drool cracking tools proliferate. So many painfully easy-to-use appz have been developed in recent years that persistence is now a far more reliable predictor of success than skill: even a newbie cracker can succeed by . . .
Kevin Mitnick used to make life miserable for corporate IT managers by breaking into computer systems. Now he's making it his business to help them secure their networks against hackers. Last month Mitnick, who was released from prison earlier this year . . .
The attack on Microsoft underscores that corporate networks are still widely vulnerable to hackers, security analysts say. Even as companies shore up security in some areas, new technologies--such as Web-based email and broadband DSL and cable Internet connections--create new vulnerabilities.. . .
Calling it an act of "industrial espionage," Microsoft said malicious hackers gained access to its internal networks, where they were able to see some of the company's upcoming software code.
ZDNet has a nice round-up of the reported MS security breach. Includes news from Ballmer, their "hackers" section, and more. I feel much better now that Ballmer has stated that the attacks were "not very damaging." They only reportedly got the source to Windows, after all. Especially interesting is a comment from a Trend Micro official, stating they have had detection for this reported trojan for months, and only regard it as a medium threat. "News that thieves have used a Trojan horse program to pilfer source code from Microsoft could have serious security implications. . . .
Microsoft Corp. and U.S. authorities are investigating an extraordinary computer break-in at Microsoft's headquarters by hackers believed to have stolen the blueprints to its most valuable software, including the latest versions of Windows and Office, people . . .
Hacking software poses special challenges because most of the tools have two equal uses, Granick said. For example, a popular hacking tool called nMap connects to a remote computer and tells the user if that computer has any . . .
At Def Con in Amsterdam, computer security experts say the draft of Europe's Cybercrime Treaty could spark a 21st century witch hunt Meet the world's newest class of persecuted artists: computer hackers. European Union nations, and perhaps even . . .
Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . .
After more than six years of chronicling the insecurities of cyberspace for a computer security newsletter, Richard Power finally decided this past spring to put it all together in a book. The result is Tangled Web: Tales of Digital Crime From . . .
Is the teenage hacker really someone to fear? In this week's Unix Security, Carole Fennelly investigates who's benefiting from the hacker hype. Just this week, I was spammed with a press release from ComputerCop, entitled "Famed NYPD Detective Urges Parents . . .
SDMI is the music industry forum trying to build a system for protecting digital music against being illegal copying. The outfit launched the Hack SDMI challenge last month to invite the public to attack its digital watermark technology and possibly win . . .
As a European intellectual distrustful of U.S. influence, Mueller-Maguhn can be counted on to make a splash when the ICANN board meets in California next month. Among his first priorities will be explaining to an American audience just what the term . . .
Michael Vatis, director of the USA's National Infrastructure Protection Center (NIPC), said the threat of crime using the internet was real and growing. Speaking at the World E-Commerce Forum in London, he described an "array of threats" to e-commerce and society . . .
Yetzer's a hacker and an acknowledged "social engineer" with curious nocturnal habits. There are thousands of people like him, who by day are system and network administrators, security analysts and start-up co-founders. When night comes, they transform into vampire wanna-bes, hedonists, . . .
A hacktivist going by the alias 'Exiled Dave' broke into on-line newspaper the Orange County Register last week and edited several stories, one of which said that Microsoft founder Bill Gates had been arrested for hacking into "hundreds, maybe thousands" of . . .
Two years ago, the then just started HNN, published an article in their Buffer Overflow section called "A hackers guide to talking to the media". It was received with different opinions around the scene (I remember it referred to as "a . . .