LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



13 indicted in $2M gas station card-skimming scheme  27 January 2014 
Source: CNET - Posted by Dave Wreski   
Pump-mounted devices used Bluetooth chips that allowed the thieves to retrieve the data without having to physically connect to the devices, prosecutors allege.
 
Why I did it: Former hacker Mitchell Frost explains his motivation  23 January 2014 
Source: Network World - Posted by Alex   
In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com.
 
China's Great Firewall directs millions to open door to free surfing  22 January 2014 
Source: CNET - Posted by Alex   
It's believed that human error caused a glitch in the country's firewall, sending people to a company that sells anti-censorship technology to Chinese citizens.
 
NSA hacking tools will find their way to criminals eventually  21 January 2014 
Source: CSO Online - Posted by Dave Wreski   
The U.S. National Security Agency has reportedly developed technology to commandeer computers even when they are off the Internet, and security experts warn it's only a matter of time before similar tools become part of cybercriminals' toolbox.
 
Spy agencies around the world use radio signals to tap data from targeted systems  16 January 2014 
Source: Network World - Posted by Dave Wreski   
Reports this week that the National Security Agency uses radio signals to collect data from tens of thousands of non-U.S. computers, some not connected to the Internet, is sure to fuel more acrimony towards the U.S. spy agency.
 
Teen Reported to Police After Finding Security Hole in Website  10 January 2014 
Source: Wired - Posted by Dave Wreski   
A teenager in Australia who thought he was doing a good deed by reporting a security vulnerability in a government website was reported to the police.
 
OpenSUSE forums hack raises vBulletin zero-day exploit possibility  09 January 2014 
Source: Network World - Posted by Dave Wreski   
A compromise of the community forums for the openSUSE Linux distribution Tuesday sparked concern that hackers have access to a previously unknown exploit for the popular vBulletin Internet forum software.
 
Snapchat hack affects 4.6 million users  02 January 2014 
Source: BBC - Posted by Dave Wreski   
The usernames and phone numbers for 4.6 million Snapchat accounts have been downloaded by hackers, who temporarily posted the data online.
 
7 sneak attacks used by today's most devious hackers  31 December 2013 
Source: Network World - Posted by Dave Wreski   
Millions of pieces of malware and thousands of malicious hacker gangs roam today's online world preying on easy dupes. Reusing the same tactics that have worked for years, if not decades, they do nothing new or interesting in exploiting our laziness, lapses in judgment, or plain idiocy.
 
Report: NSA intercepts computer deliveries to plant spyware  30 December 2013 
Source: Network World - Posted by Dave Wreski   
A special hacking unit of the U.S. National Security Agency intercepts deliveries of new computer equipment en route to plant spyware, according to a report on Sunday from Der Spiegel, a German publication.
 
<< Start < Prev 4 5 6 Next > End >>

Results 31 - 40 of 2094
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Canadians arrest a Heartbleed hacker
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.