LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



The week in review: Hacking Microsoft  28 October 2000 
Source: News.com - Posted by Chris Pallack   
Calling it an act of "industrial espionage," Microsoft said malicious hackers gained access to its internal networks, where they were able to see some of the company's upcoming software code.
 
News Roundup: Microsoft source code stolen  27 October 2000 
Source: ZDNet - Posted by Dave Wreski   
ZDNet has a nice round-up of the reported MS security breach. Includes news from Ballmer, their "hackers" section, and more. I feel much better now that Ballmer has stated that the attacks were "not very damaging." They only reportedly got the source to Windows, after all. Especially interesting is a comment from a Trend Micro official, stating they have had detection for this reported trojan for months, and only regard it as a medium threat. "News that thieves have used a Trojan horse program to pilfer source code from Microsoft could have serious security implications. . . .
 
Microsoft's network is hacked  27 October 2000 
Source: MSNBC - Posted by Jen Olson   
Microsoft Corp. and U.S. authorities are investigating an extraordinary computer break-in at Microsoft's headquarters by hackers believed to have stolen the blueprints to its most valuable software, including the latest versions of Windows and Office, people . . .
 
EU pact criminalising security research? Pt II  26 October 2000 
Source: ZDNet - Posted by Jen Olson   
Hacking software poses special challenges because most of the tools have two equal uses, Granick said. For example, a popular hacking tool called nMap connects to a remote computer and tells the user if that computer has any . . .
 
EU pact criminalising security research?  26 October 2000 
Source: ZDNet - Posted by Jen Olson   
At Def Con in Amsterdam, computer security experts say the draft of Europe's Cybercrime Treaty could spark a 21st century witch hunt Meet the world's newest class of persecuted artists: computer hackers. European Union nations, and perhaps even . . .
 
The Pros and Cons of Posting Vulnerabilities  26 October 2000 
Source: Network Magazine - Posted by Dave Wreski   
Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . .
 
Shining light on cybercrime  24 October 2000 
Posted by Dave Wreski   
After more than six years of chronicling the insecurities of cyberspace for a computer security newsletter, Richard Power finally decided this past spring to put it all together in a book. The result is Tangled Web: Tales of Digital Crime From . . .
 
Cyber-exploitation: Making money on kids  23 October 2000 
Source: SunWorld - Posted by Chris Pallack   
Is the teenage hacker really someone to fear? In this week's Unix Security, Carole Fennelly investigates who's benefiting from the hacker hype. Just this week, I was spammed with a press release from ComputerCop, entitled "Famed NYPD Detective Urges Parents . . .
 
Princeton Team Cracks SDMI  23 October 2000 
Source: LinuxToday - Posted by Dave Wreski   
SDMI is the music industry forum trying to build a system for protecting digital music against being illegal copying. The outfit launched the Hack SDMI challenge last month to invite the public to attack its digital watermark technology and possibly win . . .
 
Proud to Represent Hackers  19 October 2000 
Source: Wired - Posted by Jen Olson   
As a European intellectual distrustful of U.S. influence, Mueller-Maguhn can be counted on to make a splash when the ICANN board meets in California next month. Among his first priorities will be explaining to an American audience just what the term . . .
 
<< Start < Prev 202 203 204 Next > End >>

Results 2031 - 2040 of 2141
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
NSA keeps low profile at hacker conventions despite past appearances
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.