LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



'Covert Redirect' OAuth flaw more chest-beat than Heartbleed  05 May 2014 
Source: The Register UK - Posted by Benjamin D. Thomas   
A recently reported new "vulnerability" in OAuth appears to be anything but. That unkind assessment has come from security specialists after a flaw called "Covert Redirect" made headlines that conflated the flaw with the Heartbleed vulnerability, a major security risk that legitimately sent administrators scrambling to fix their websites.
 
Script fools n00b hackers into hacking themselves  02 May 2014 
Source: The Register UK - Posted by Dave Wreski   
Security experts have warned Facebook users in India not to fall for a new scam which tricks victims into “self cross-site scripting” by promising access to a tool which will let them hack their friends’ accounts.
 
Hackers Can Mess With Traffic Lights to Jam Roads and Reroute Cars  30 April 2014 
Source: Wired - Posted by Dave Wreski   
The hacker in the Italian Job did it spectacularly. So did the fire sale team in Live Free or Die Hard. But can hackers really hijack traffic lights to cause gridlock and redirect cars?
 
Hacker takes control of Ohio couple's baby monitor and screams 'bad things'  28 April 2014 
Source: Independent UK - Posted by Dave Wreski   
The parents of a 10-month-old baby in Ohio were left reeling when an unknown hacker took control of the infant’s baby monitor and screamed “obscenities”.
 
Internet Explorer bug used by hackers to attack U.S. firms  28 April 2014 
Source: CBC - Posted by Dave Wreski   
The U.S. Department of Homeland Security advised computer users to consider using alternatives to Microsoft Corp's Internet Explorer browser until the company fixes a security flaw that hackers have used to launch attacks.
 
The Hackers Who Recovered NASA’s Lost Lunar Photos  25 April 2014 
Source: Wired - Posted by Dave Wreski   
Sitting incongruously among the hangars and laboratories of NASA’s Ames Research Center in Silicon Valley is the squat facade of an old McDonald’s. You won’t get a burger there, though–its cash registers and soft-serve machines have given way to old tape drives and modern computers run by a rogue team of hacker engineers who’ve rechristened the place McMoon’s.
 
Top hacker says US spies on Australia  25 April 2014 
Source: Sydney Morning Herald - Posted by Dave Wreski   
One of the world’s top cyber-security experts says the biggest threat facing Australia is the US. French-born, Sydney-based Jonathan Brossard, whose stable of clients includes the Commonwealth Bank and European car manufacturers, says the US may be a close ally but it would wrong to think the US was not spying on Australia.
 
Galaxy S5 fingerprint scanner hacked with glue mould  16 April 2014 
Source: BBC - Posted by Dave Wreski   
The researchers fooled the new handset using a mould made out of glue. The fingerprint sensor on Samsung's Galaxy S5 handset has been hacked less than a week after the device went on sale.
 
Hackers From China Waste Little Time in Exploiting Heartbleed  15 April 2014 
Source: Bloomberg BusinessWeek - Posted by Dave Wreski   
For those who don't feel the urgency to install the latest security fixes for their computers, take note: Just a day after Heartbleed was revealed, attacks from a computer in China were launched.
 
Hackers Lurking in Vents and Soda Machines  09 April 2014 
Source: NY Times - Posted by Dave Wreski   
Unable to breach the computer network at a big oil company, hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business’s vast computer network.
 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 2141
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DARPA-derived secure microkernel goes open source tomorrow
Hacker Gary McKinnon turns into a search expert
Hackers seed Amazon cloud with potent denial-of-service bots
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.