LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Attackers Can ‘Steal’ Bandwidth From BitTorrent Seeders, Research Finds  20 August 2014 
Source: TorrentFreak - Posted by Dave Wreski   
New research reveals that BitTorrent swarms can be slowed down significantly by malicious peers. Depending on the number of seeders and the clients they use, download times can be increased by 1000%. The attacks are possible through an exploit of the BitTorrent protocol for which the researchers present a fix.
 
4 small business security lessons from real-life hacks  14 August 2014 
Source: CSO Online - Posted by Dave Wreski   
Recent cases of social engineering, DDoS attacks and domain-name theft have made headlines. Some stories had happy endings, but others didn't. Here are four tips for preventing these types of hacks from ruining your business. It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify.
 
Watch a Hacker Fry a Hair Dryer With Her Radio  12 August 2014 
Source: Wired - Posted by Anthony Pell   
As Maggie Jauregui was getting ready for a date last November, she was simultaneously blow drying her hair and chatting with her boyfriend over a walkie talkie—the sort of electronic gadget that the hacker couple enjoy messing around with.
 
Hacker hunts and pwns WiFi Pineapples with zero-day at Def Con  12 August 2014 
Source: Network World - Posted by Alex   
The WiFi Pineapple makes man-in-the-middle attacks incredibly easy, but users better know what they're doing before trying out the Pineapple at the biggest hacker hangout in the U.S. A classic example of that wisdom can be seen via a screenshot tweeted by @JoFo after an intern deployed a Pineapple at Def Con 22.
 
Russian hackers amass 1.2B stolen Web credentials  06 August 2014 
Source: CSO Online - Posted by Dave Wreski   
Criminals in Russia have amassed a huge database of 1.2 billion stolen user names and passwords and half a billion email addresses, a U.S.-based Internet security company said Wednesday.
 
Insecure Connections: Enterprises hacked after neglecting third-party risks  29 July 2014 
Source: CSO Online - Posted by Dave Wreski   
It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access.
 
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System  29 July 2014 
Source: Krebs on Security - Posted by Dave Wreski   
Three Israeli defense contractors responsible for building the “Iron Dome” missile shield currently protecting Israel from a barrage of rocket attacks were compromised by hackers and robbed of huge quantities of sensitive documents pertaining to the shield technology, KrebsOnSecurity has learned.
 
Four fake Google haxbots hit YOUR WEBSITE every day  25 July 2014 
Source: The Register UK - Posted by Dave Wreski   
One in every 24 Googlebots is a imitation spam-flinging denial of service villain that masquerades as Mountain View to sneak past web perimeter defences, according to security chaps at Incapsula. Villains spawn the "evil twins" to hack and crack legitimate websites and form what amounted to the third most-popular type of DDoS attack to scourge the internet.
 
Hackers Could Take Control of Your Car. This Device Can Stop Them  22 July 2014 
Source: Wired - Posted by Dave Wreski   
Hackers Charlie Miller and Chris Valasek have proven more clearly than anyone in the world how vulnerable cars are to digital attack. Now they’re proposing the first step towards a solution.
 
Here’s How Easy It Could Be for Hackers to Control Your Hotel Room  17 July 2014 
Source: Wired - Posted by Dave Wreski   
Shenzhen is the Silicon Valley of mainland China. Situated about 50 minutes north of Hong Kong, the modern city is home to the Shenzhen Stock Exchange and numerous high-tech giants and startups.
 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 2186
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google Removes SSLv3 Fallback Support From Chrome
Hacker Lexicon: What Is End-to-End Encryption?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.