Hacks/Cracks - Page 133

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Wide Spread UNIX Vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A serious security vulnerability has been found in glibc, the standard C library which is responsible for many core functions, including printf(). This new form of vulnerability, titled "format string" vulnerability, occurs when an input string is interpreted incorrectly, resulting in the potential for execution of arbitrary code. Most vendors have already released updates.. . .

British firm set to beat hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A former school dropout who invented a breakthrough anti-hacking system and founded a company to develop it has won backing from funds connected with two of the best-known technology investors. Cryptic Software, founded by David Duke, 33, is completing a . . .

To Tell, or Not to Tell?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some "bug hunters" who uncover security flaws in computer software and rush to issue public warnings may be helping hackers more than consumers, industry officials worry. It's a thorny issue that divides security specialists. Many argue that fast, full disclosure of a vulnerability alerts computer users to take precautions and pushes software makers to provide a quick solution.. . .

Attacking Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network scanning, password grabbing, trojaned software -- all are the bane of the righteous sysadmin. Craig Ozancin reveals how to beef up network security and ward off attackers at the LinuxWorld Expo, as reported by Rick Moen. "Nessus, the older SATAN . . .

Palm gets hit with first Trojan horse

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first known Trojan horse aimed at handhelds struck late last week. A Trojan horse is a malicious program that appears to be legitimate, which is often attached to free gaming software. Trojan horses can locate password information, make systems more susceptible to future entry, or sabotage data on a user's hard disk.. . .

Scary Hole Found at ZKey

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

supposed to be securely stored on ZKey's award-winning information storage portal. All he needed was a little JavaScript. A new security hole, discovered Aug. 14 by a hacker who calls himself "Blue Adept," allows ZKey users on Internet Explorer 5.5 . . .

Hackers hammer Irish Internet service

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Thousands of computer users were left without an Internet connection after a hacker attacked the Irish Internet service provider Eircom. The company issued new passwords to its 240,000 customers in Ireland as a precautionary measure to protect e-mails and websites. . . .

Oxfam suffers security breach

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Charity group, Oxfam, was hit by a security attack yesterday in which the email details of 300 customers were downloaded. A spokeswoman for the group explained a friendly hack was suspected. The organisation is just the latest in a series of . . .