Hacks/Cracks - Page 129

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Can hackers crack million-dollar dare?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An Australian company, that claims to have developed the ultimate security-proof system, will soon issue a multi-million dollar dare to the hacking underworld. With a 30-day deadline, the challenge to crack Secure Systems' Silicon Data Vault technology will . . .

Meet the Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Not all hackers are bad guys. But understanding what motivates them can make you less vulnerable to an attack. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities. Hackers also relish the intellectual challenge . . .

Does Attrition Foster Web Defacements?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A big topic on the Internet is web page defacements. The term "defacement" or "web graffiti" refer to an incident when someone gains unauthorized access and alters the index page of that particular violated site. Usually the replaced index resembles the . . .

No ban on hacking tools

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Council of Europe has dropped proposals to outlaw the use of "hacking" tools by IT departments, following an intense lobbying campaign by businesses. The proposals were contained in the Council of Europe's Convention on Crime in Cyberspace, which aims to . . .

Hacker's Prison ID card on Sale

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A celebrity computer hacker gained more notoriety after three online auction sites posted then removed from sale his prison ID card. The ID card of Kevin Mitnick is being offered on start-up auction site DutchBid.com after being rejected by Amazon.com, Yahoo! . . .

Any port is a hacker storm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Central to [the SYN] attack is the ability of the miscreant to find an "open" port - that is, a port on the destination machine that responds to connection requests. If a hacker is trying to find your weaknesses, he will . . .

Sleaze Bay: Scams Online

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An educated consumer is a safe consumer. In that spirit, here is Forbes ASAP's complete guide to the dark side of online auction trading. "The average person who uses eBay is just completely ignorant," says one frequent seller (who, like . . .

Hacking With a Conscience Is a New Trend

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... more and more hackers are using their tricks to spread socially conscious messages, security experts say. The trend -- dubbed "hacktivism" -- has shown up in a number of recent incidents: -- On Election Day, a Democrat hacked the Republican . . .

Tapping on the walls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. In this month's Building Blocks of Security, Sandra Henry-Stocker shows you how to stay one step ahead of . . .

Holding back hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Businesses are starting to realize that while the new economy requires the Internet, it also requires protection from those who take pleasure or profit sneaking into a company's electronic recesses. "I think a lot of people don't understand that with . . .

EPIC: Carnivore not as selective as FBI said

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Carnivore, the Federal Bureau of Investigation's e-mail surveillance software, is capable of capturing "all unfiltered traffic," despite assurances from the FBI this summer that the program only captures e-mails going to people on whom the FBI has a warrant.. . .

Bug-hunters say security holes go unheeded

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Experts say companies are failing to respond to security alerts, describing the laissez-faire -- or just plain lazy -- attitude as 'irresponsible.' Major software firms may be neglecting security vulnerabilities and putting their users at serious risk, according to bug-hunters at . . .

EDS devises package to pre-empt hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Big-mouthed hackers to come a cropper Services giant EDS last week said it knew about recent denial-of-service attacks two months before they happened, and had even identified the tools the crackers were planning to use. Speaking in Las Vegas . . .

Hackers' Tricks to Avoid Detection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as . . .

Should You Strike Back?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's a war brewing in cyberspace. Make that a Netwar, so dubbed in Countering the New Terrorism, a book published last year by The RAND Corp., a Santa Monica, Calif.-based nonprofit research group formed during World War II.. . .