Hacks/Cracks - Page 130.5

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

'Hactivist' threats on the rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer hackers with political agendas have become a fast-growing threat to big companies worldwide, a corporate intelligence company said on Thursday. "The methods they are using are in their infancy," said Kent Anderson of Control Risks Group, an international business risk . . .

Cyber Crime Corp. Unveils E-Snitch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

High-tech thieves and industrial spies seem like the makings for the next John Grisham novel, but the folks over at the Cyber Group Network Corp. take cyber theft very seriously. The company's subsidiary, Cyber Crime Corp., today unveiled its revolutionary E-Snitch . . .

SafeVote Invites Hackers To Give It A Crack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As a growing interest in online voting emerges and companies like Election.com have completed several mostly-successful medium-scale elections online, an Internet voting service is inviting hackers from around the world to test its particular system's defenses.. . .

How you hack into Microsoft: a step by step guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security becomes increasingly difficult as point-and-drool cracking tools proliferate. So many painfully easy-to-use appz have been developed in recent years that persistence is now a far more reliable predictor of success than skill: even a newbie cracker can succeed by . . .

Know Thine Enemy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kevin Mitnick used to make life miserable for corporate IT managers by breaking into computer systems. Now he's making it his business to help them secure their networks against hackers. Last month Mitnick, who was released from prison earlier this year . . .

New technologies create fresh inroads for hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The attack on Microsoft underscores that corporate networks are still widely vulnerable to hackers, security analysts say. Even as companies shore up security in some areas, new technologies--such as Web-based email and broadband DSL and cable Internet connections--create new vulnerabilities.. . .

News Roundup: Microsoft source code stolen

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ZDNet has a nice round-up of the reported MS security breach. Includes news from Ballmer, their "hackers" section, and more. I feel much better now that Ballmer has stated that the attacks were "not very damaging." They only reportedly got the source to Windows, after all. Especially interesting is a comment from a Trend Micro official, stating they have had detection for this reported trojan for months, and only regard it as a medium threat. "News that thieves have used a Trojan horse program to pilfer source code from Microsoft could have serious security implications. . . .

Microsoft's network is hacked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft Corp. and U.S. authorities are investigating an extraordinary computer break-in at Microsoft's headquarters by hackers believed to have stolen the blueprints to its most valuable software, including the latest versions of Windows and Office, people . . .

EU pact criminalising security research?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At Def Con in Amsterdam, computer security experts say the draft of Europe's Cybercrime Treaty could spark a 21st century witch hunt Meet the world's newest class of persecuted artists: computer hackers. European Union nations, and perhaps even . . .

The Pros and Cons of Posting Vulnerabilities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . .

Shining light on cybercrime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After more than six years of chronicling the insecurities of cyberspace for a computer security newsletter, Richard Power finally decided this past spring to put it all together in a book. The result is Tangled Web: Tales of Digital Crime From . . .

Cyber-exploitation: Making money on kids

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Is the teenage hacker really someone to fear? In this week's Unix Security, Carole Fennelly investigates who's benefiting from the hacker hype. Just this week, I was spammed with a press release from ComputerCop, entitled "Famed NYPD Detective Urges Parents . . .

Princeton Team Cracks SDMI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SDMI is the music industry forum trying to build a system for protecting digital music against being illegal copying. The outfit launched the Hack SDMI challenge last month to invite the public to attack its digital watermark technology and possibly win . . .

Proud to Represent Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As a European intellectual distrustful of U.S. influence, Mueller-Maguhn can be counted on to make a splash when the ICANN board meets in California next month. Among his first priorities will be explaining to an American audience just what the term . . .

Cybercrime threat 'real and growing'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Michael Vatis, director of the USA's National Infrastructure Protection Center (NIPC), said the threat of crime using the internet was real and growing. Speaking at the World E-Commerce Forum in London, he described an "array of threats" to e-commerce and society . . .

Inside the world of a 'hactivist'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Yetzer's a hacker and an acknowledged "social engineer" with curious nocturnal habits. There are thousands of people like him, who by day are system and network administrators, security analysts and start-up co-founders. When night comes, they transform into vampire wanna-bes, hedonists, . . .

Hacktivist edits on-line newspaper

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A hacktivist going by the alias 'Exiled Dave' broke into on-line newspaper the Orange County Register last week and edited several stories, one of which said that Microsoft founder Bill Gates had been arrested for hacking into "hundreds, maybe thousands" of . . .