LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



DQ Breach? HQ Says No, But Would it Know?  29 August 2014 
Source: Krebs on Security - Posted by Dave Wreski   
Sources in the financial industry say they’re seeing signs that Dairy Queen may be the latest retail chain to be victimized by cybercrooks bent on stealing credit and debit card data.
 
Mozilla reports user data leak from Bugzilla project  28 August 2014 
Source: TechWorld - Posted by Dave Wreski   
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
 
Hackers Ground Sony Executive's Flight With Bomb-Threat Tweet  25 August 2014 
Source: Forbes - Posted by Dave Wreski   
Gamers have been annoyed all day today as a hacker collective (or individual) known as the “Lizard Squad” succeeded in taking offline many gaming services including Blizzard’s Battle.net and Sony PSN. But things took a turn from irritating DDoS attacks to another level of harassment earlier this afternoon when the group took to Twitter to announce publicly that it believed the flight carrying Sony Online Entertainment President John Smedley had explosives on board.
 
Stealthy, Razor Thin ATM Insert Skimmers  21 August 2014 
Source: Krebs on Security - Posted by Dave Wreski   
An increasing number of ATM skimmers targeting banks and consumers appear to be of the razor-thin insert variety. These card-skimming devices are made to fit snugly and invisibly inside the throat of the card acceptance slot. Here’s a look at a stealthy new model of insert skimmer pulled from a cash machine in southern Europe just this past week.
 
Attackers Can ‘Steal’ Bandwidth From BitTorrent Seeders, Research Finds  20 August 2014 
Source: TorrentFreak - Posted by Dave Wreski   
New research reveals that BitTorrent swarms can be slowed down significantly by malicious peers. Depending on the number of seeders and the clients they use, download times can be increased by 1000%. The attacks are possible through an exploit of the BitTorrent protocol for which the researchers present a fix.
 
4 small business security lessons from real-life hacks  14 August 2014 
Source: CSO Online - Posted by Dave Wreski   
Recent cases of social engineering, DDoS attacks and domain-name theft have made headlines. Some stories had happy endings, but others didn't. Here are four tips for preventing these types of hacks from ruining your business. It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify.
 
Watch a Hacker Fry a Hair Dryer With Her Radio  12 August 2014 
Source: Wired - Posted by Anthony Pell   
As Maggie Jauregui was getting ready for a date last November, she was simultaneously blow drying her hair and chatting with her boyfriend over a walkie talkie—the sort of electronic gadget that the hacker couple enjoy messing around with.
 
Hacker hunts and pwns WiFi Pineapples with zero-day at Def Con  12 August 2014 
Source: Network World - Posted by Alex   
The WiFi Pineapple makes man-in-the-middle attacks incredibly easy, but users better know what they're doing before trying out the Pineapple at the biggest hacker hangout in the U.S. A classic example of that wisdom can be seen via a screenshot tweeted by @JoFo after an intern deployed a Pineapple at Def Con 22.
 
Russian hackers amass 1.2B stolen Web credentials  06 August 2014 
Source: CSO Online - Posted by Dave Wreski   
Criminals in Russia have amassed a huge database of 1.2 billion stolen user names and passwords and half a billion email addresses, a U.S.-based Internet security company said Wednesday.
 
Insecure Connections: Enterprises hacked after neglecting third-party risks  29 July 2014 
Source: CSO Online - Posted by Dave Wreski   
It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access.
 
<< Start < Prev 1 2 3 Next > End >>

Results 21 - 30 of 2170
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mobile Device Encryption Could Lead to a ‘Very, Very Dark Place’, FBI Director Says
What a hacker can learn about your life from the coffee shop’s Wi-Fi network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.