Hacks/Cracks - Page 131
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
At Def Con in Amsterdam, computer security experts say the draft of Europe's Cybercrime Treaty could spark a 21st century witch hunt Meet the world's newest class of persecuted artists: computer hackers. European Union nations, and perhaps even . . .
Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . .
After more than six years of chronicling the insecurities of cyberspace for a computer security newsletter, Richard Power finally decided this past spring to put it all together in a book. The result is Tangled Web: Tales of Digital Crime From . . .
Is the teenage hacker really someone to fear? In this week's Unix Security, Carole Fennelly investigates who's benefiting from the hacker hype. Just this week, I was spammed with a press release from ComputerCop, entitled "Famed NYPD Detective Urges Parents . . .
SDMI is the music industry forum trying to build a system for protecting digital music against being illegal copying. The outfit launched the Hack SDMI challenge last month to invite the public to attack its digital watermark technology and possibly win . . .
As a European intellectual distrustful of U.S. influence, Mueller-Maguhn can be counted on to make a splash when the ICANN board meets in California next month. Among his first priorities will be explaining to an American audience just what the term . . .
Michael Vatis, director of the USA's National Infrastructure Protection Center (NIPC), said the threat of crime using the internet was real and growing. Speaking at the World E-Commerce Forum in London, he described an "array of threats" to e-commerce and society . . .
Yetzer's a hacker and an acknowledged "social engineer" with curious nocturnal habits. There are thousands of people like him, who by day are system and network administrators, security analysts and start-up co-founders. When night comes, they transform into vampire wanna-bes, hedonists, . . .
A hacktivist going by the alias 'Exiled Dave' broke into on-line newspaper the Orange County Register last week and edited several stories, one of which said that Microsoft founder Bill Gates had been arrested for hacking into "hundreds, maybe thousands" of . . .
Two years ago, the then just started HNN, published an article in their Buffer Overflow section called "A hackers guide to talking to the media". It was received with different opinions around the scene (I remember it referred to as "a . . .
The driving force for hackers usually isn't malice, but rather curiosity. Most hackers are young males, and some are harmless. It's the so-called "crackers" who are more malicious. However, a distinction between the two usually isn't made except in hacker culture.. . .
While many IT professionals spend their time figuring out how to keep crackers from breaking in and wreaking havoc in their computer systems and on their websites, Ernst and Young are planning to teach 60 people how to do just that . . .
Linux firms have plugged flaws from last week, but new 'GLIBC' hole has manifested itself. The flaws in some Linux programs that have let crackers infiltrate hundreds of servers in past weeks have been plugged in updated . . .
Infamous hacker Kevin Mitnick warned IT managers Wednesday that unless they educate every employee -- from the CEO to the receptionist -- about how hackers work and how to bolster security, corporate networks and Web sites will never be safe from . . .
Visitors to Slashdot this evening were greeted by a story announcing that the popular site's database had been compromised by 'hackers from the Netherlands,' who had secured the exploit and e-mailed Slashdot administrators informing them of the compromise.
Last March, I wrote about the experience of being hacked. Your correspondent, still a Linux newbie after months of effort, discovered that his home-built Red Hat Linux machine had been commandeered and turned into an IRC chatbot by someone named "bonez".. . .
The security of online banking came under fire again today after a software analyst claimed he had been able to access people's accounts without breaking into a sweat. Ralph Dressel, a software analyst at Royal Skandia Investment Bank said that he . . .
A 16-year-old Miami resident who hacked into military and NASA computer systems will serve six months in a detention facility for his offenses. It's the first instance of a convicted juvenile hacker having to serve time for acts of juvenile delinquency, . . .
Banking software firm Fiserv has denied claims by the Observer newspaper that data accessed through one of its Web sites gave a UK security expert access to thousands of genuine bank accounts. Fiserv says security engineer Ralph Dressel . . .
WESTERN Union Holdings Inc.'s Web site was out of commission for five days last week after a malicious hacker broke into the site and apparently copied the credit-card or debit-card numbers of about 15,700 Western Union customers. Peter Ziverts, a . . .