LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Insecure Connections: Enterprises hacked after neglecting third-party risks  29 July 2014 
Source: CSO Online - Posted by Dave Wreski   
It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access.
 
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System  29 July 2014 
Source: Krebs on Security - Posted by Dave Wreski   
Three Israeli defense contractors responsible for building the “Iron Dome” missile shield currently protecting Israel from a barrage of rocket attacks were compromised by hackers and robbed of huge quantities of sensitive documents pertaining to the shield technology, KrebsOnSecurity has learned.
 
Four fake Google haxbots hit YOUR WEBSITE every day  25 July 2014 
Source: The Register UK - Posted by Dave Wreski   
One in every 24 Googlebots is a imitation spam-flinging denial of service villain that masquerades as Mountain View to sneak past web perimeter defences, according to security chaps at Incapsula. Villains spawn the "evil twins" to hack and crack legitimate websites and form what amounted to the third most-popular type of DDoS attack to scourge the internet.
 
Hackers Could Take Control of Your Car. This Device Can Stop Them  22 July 2014 
Source: Wired - Posted by Dave Wreski   
Hackers Charlie Miller and Chris Valasek have proven more clearly than anyone in the world how vulnerable cars are to digital attack. Now they’re proposing the first step towards a solution.
 
Here’s How Easy It Could Be for Hackers to Control Your Hotel Room  17 July 2014 
Source: Wired - Posted by Dave Wreski   
Shenzhen is the Silicon Valley of mainland China. Situated about 50 minutes north of Hong Kong, the modern city is home to the Shenzhen Stock Exchange and numerous high-tech giants and startups.
 
CNET attacked by Russian hacker group  15 July 2014 
Source: CNET - Posted by Dave Wreski   
A Russian hacker group that has attacked some of the biggest news and business sites in the world claims it penetrated CNET's website over the weekend and stole a database of registered reader data.
 
Popular password protection programs p0wnable  14 July 2014 
Source: The Register UK - Posted by Alex   
Researchers have detailed a series of quickly patched vulnerabilities in five popular password managers that could allow attackers to steal user credentials. "Critical" vulnerabilities were discovered and reported in LastPass, RoboForm, My1Login, PasswordBox and NeedMyPassword in work described by the University of California Berkeley researchers as a "wake-up call" for developers of web password vaults.
 
Bug Lab Hackers sell Facebook Privacy Vulnerability  14 July 2014 
Source: Cyber War Zone - Posted by Dave Wreski   
The Bug Lab hacking group which can be found on 1337day.com, is selling a Facebook Privacy Vulnerability which allows the hacker to send messages via any Facebook account.
 
Weaponised Flash flaw can pinch just about anything from anywhere  09 July 2014 
Source: The Register UK - Posted by Dave Wreski   
Get cracking with the latest Flash upgrade, because the vulnerability it patches is a peach, allowing a cross-site request forgery (CSRF) attack for stealing user credentials.
 
Blue Shield discloses 18,000 doctors' Social Security numbers  08 July 2014 
Source: TechWorld - Posted by Alex   
The Social Security numbers of roughly 18,000 California physicians and health-care providers were inadvertently made public after a slip-up at health insurance provider Blue Shield of California, the organization said Monday.
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 2141
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
NSA keeps low profile at hacker conventions despite past appearances
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.