Linux Hacks & Cracks

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Should You Strike Back?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's a war brewing in cyberspace. Make that a Netwar, so dubbed in Countering the New Terrorism, a book published last year by The RAND Corp., a Santa Monica, Calif.-based nonprofit research group formed during World War II.. . .

Online Music Safeguards Withstand Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A coalition of companies in the software and recording industries declared yesterday that three of five technologies aimed at stopping the online piracy of music had so far survived attack by hackers seeking to win $10,000 for cracking the security measures. . . .

The new age of hacktivism

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Politicians may not pander to them and experts may discount their opinions, but online vandals are getting the message out about what they think is important: Increasingly, that's politics. On the eve of the U.S. elections, vandals defaced the home pages . . .

After hack, Microsoft mistakes linger

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After further review, security experts last week said enterprises can glean some new lessons from the Microsoft Corp. hacking saga. First and foremost, if you get hacked, don't do what Microsoft did. According to at least a dozen security experts contacted . . .

Cybercrime soars in the UK

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cybercrime accounted for half of all fraud committed in the UK in the first six months of this year, according to a legal expert. Steven Philippsohn, senior litigation partner at law firm Philippsohn, Crawfords, Berwald, said this figure would rise as . . .

Combating Internet crimes and threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With cybercrime on the rise, even more attention is being paid to using the law to fight the cybercrooks. Only days ago, it was reported that the blueprints to the latest versions of Microsoft's (MSFT) Windows and Office software package were . . .

'Hactivist' threats on the rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer hackers with political agendas have become a fast-growing threat to big companies worldwide, a corporate intelligence company said on Thursday. "The methods they are using are in their infancy," said Kent Anderson of Control Risks Group, an international business risk . . .

Cyber Crime Corp. Unveils E-Snitch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

High-tech thieves and industrial spies seem like the makings for the next John Grisham novel, but the folks over at the Cyber Group Network Corp. take cyber theft very seriously. The company's subsidiary, Cyber Crime Corp., today unveiled its revolutionary E-Snitch . . .

SafeVote Invites Hackers To Give It A Crack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As a growing interest in online voting emerges and companies like Election.com have completed several mostly-successful medium-scale elections online, an Internet voting service is inviting hackers from around the world to test its particular system's defenses.. . .

How you hack into Microsoft: a step by step guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security becomes increasingly difficult as point-and-drool cracking tools proliferate. So many painfully easy-to-use appz have been developed in recent years that persistence is now a far more reliable predictor of success than skill: even a newbie cracker can succeed by . . .

Know Thine Enemy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kevin Mitnick used to make life miserable for corporate IT managers by breaking into computer systems. Now he's making it his business to help them secure their networks against hackers. Last month Mitnick, who was released from prison earlier this year . . .

New technologies create fresh inroads for hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The attack on Microsoft underscores that corporate networks are still widely vulnerable to hackers, security analysts say. Even as companies shore up security in some areas, new technologies--such as Web-based email and broadband DSL and cable Internet connections--create new vulnerabilities.. . .

News Roundup: Microsoft source code stolen

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ZDNet has a nice round-up of the reported MS security breach. Includes news from Ballmer, their "hackers" section, and more. I feel much better now that Ballmer has stated that the attacks were "not very damaging." They only reportedly got the source to Windows, after all. Especially interesting is a comment from a Trend Micro official, stating they have had detection for this reported trojan for months, and only regard it as a medium threat. "News that thieves have used a Trojan horse program to pilfer source code from Microsoft could have serious security implications. . . .

Microsoft's network is hacked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft Corp. and U.S. authorities are investigating an extraordinary computer break-in at Microsoft's headquarters by hackers believed to have stolen the blueprints to its most valuable software, including the latest versions of Windows and Office, people . . .