| Saturday November 22nd 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘hax’ Archives

T-Mobile Investigating Claims It Was Breached

T-Mobile Investigating Claims It Was Breached

Elaborate hoax or the real deal? An anonymous post on a popular security disclosure site during the weekend claiming to have accessed T-Mobile's databases, financial documents, and other sensitive data has the wireless provider currently investigating whether the data and systems are truly in the hands of bad guys. A post on the Full Disclosure [...]

Recent Study: Most Enterprises Expect To Get Hacked This Year

Recent Study: Most Enterprises Expect To Get Hacked This Year

Call it realism, or call it pessimism, but most organizations today are resigned to getting hacked. In fact, a full 94 percent expect to suffer a successful breach in the next 12 months, according to a new study on ethical hacking to be released by British Telecom (BT) later this week. The twist: Those who conduct network penetration tests [...]

Bemoaning the death of Hacker Culture

Bemoaning the death of Hacker Culture

Do you get the feeling that the information security industry has really changed the last 3-5 years? Remove the obvious: the industry is much larger, of higher public profile, and much better funded across the board. I would venture to guess, that way back when, say, in the dark ages of 1999, the primary reason people chose to get into the field [...]

Hackerspaces around the world

Hackerspaces around the world

Wired has a great piece up on the world's burgeoning crop of Hacker Spaces -- clubhouses where members pitch in to share the rent in exchange for a role in governing a collectively managed collection of hacking kit: workbenches, tools, and components. I've visited hacker lofts in Vienna, San Diego, Los Angeles and elsewhere, and they always have a [...]

New Rootkit Attack Hard To Kill

New Rootkit Attack Hard To Kill

Researchers have come up with a way to create an even stealthier rootkit that survives reboots and evades antivirus software. Anibal Sacco and Alfredo Ortega, both exploit writers for Core Security Technologies, were able to inject a rootkit into commercial BIOS firmware using their own Python-based tool that installed the rootkit via an [...]

Verified by Visa: British banks phish their own customers

Verified by Visa: British banks phish their own customers

Security expert Ben Laurie has a scorching indictment of the "Verified by Visa" program used by British banks. This system is basically the perfect system for phishers and identity thieves, and conditions honest people to behave in foolish ways that leave them vulnerable to having their life's saving taken off of them. "Frame inline displays the [...]

HOWTO: USB sniffing in linux

HOWTO: USB sniffing in linux

The linux kernel has a facility called “usbmon” which can be used to sniff the USB bus. It’s been in there for ages, and the output is really easy to collect, even from the command line shell. Simply mount debugfs and insmod the usbmon module: mount -t debugfs none_debugs /sys/kernel/debug modprobe usbmon Then you can just cat USB traffic [...]

Where Was Linux In The Pwn2Own Contest?

Where Was Linux In The Pwn2Own Contest?

The first round of the Pwn2Own was something of a redux of the previous one: the Mac was the first to fall (I'm actually not surprised given Apple's culture of obscurity-over-security), with Windows 7 via IE 8 shortly thereafter. But Linux wasn't even in the running this time. What gives? A couple of comments posted on the TippingPoint blog [...]

Pwn2Own trifecta: Hacker exploits IE8, Firefox, & Safari

Pwn2Own trifecta: Hacker exploits IE8, Firefox, & Safari

It took a while longer but Microsoft’s Internet Explorer 8 did not survive the hacker onslaught at this year’s CanSecWest Pwn2Own contest. A security researcher named “Nils” (he declined to provide his full name) performed a clean drive-by download attack against the world’s most widely used browser to take full control of a Sony Vaio [...]

Pwn2Own 2009: Safari on a MacBook falls in seconds

Pwn2Own 2009: Safari on a MacBook falls in seconds

Charlie Miller has done it again.  For the second consecutive year, the security researcher hacked into a fully patched MacBook computer by exploiting a security vulnerability in Apple’s Safari browser. “It took a couple of seconds.  They clicked on the link and I took control of the machine,” Miller said moments after his [...]

Major Cybercrime Busts Take Place In Romania

Major Cybercrime Busts Take Place In Romania

The Romanian police had a busy Wednesday, breaking up a major bank fraud ring and arresting another individual who is accused of breaking into major U.S. government and university servers. According to news reports, the Romanian police, working along with the FBI, arrested 20 individuals who allegedly built cloned bank sites and then drained [...]

Hosted malware allows n00bs to hack along with the l33t

Hosted malware allows n00bs to hack along with the l33t

Say you've bought a tool for infecting PCs and using them to send spam, harvest bank details and passwords, or some other criminal act -- but you lack the technical wherewithal to install and maintain the tool yourself. Have no fear: a new "cybercrime-as-a-service" industry offers hosted, maintained malware deployments that you can rent time [...]

Chinese hackers break iTunes gift card algorithm

Chinese hackers break iTunes gift card algorithm

$200 iTunes Gift Certificates are selling for less than $3 in China now that a group of local hackers has circumvented Apple's algorithm for creating the digital vouchers and built their own gift certificate generators. According to Outdustry, a website which describes itself as a music industry consultancy specializing in the Chinese music [...]

New XSS Attack Builds An Anonymous Network

New XSS Attack Builds An Anonymous Network

A pair of researchers has combined cross-site scripting (XSS) and anonymization techniques to build a framework that lets an attacker gather Web content incognito. "Our goal was to retrieve Web content anonymously," says Matthew Flick, principal with FYRM Associates, who, along with fellow researcher Jeff Yestrumskas, demonstrated the XSS [...]

Kindle 2 teardown

Kindle 2 teardown

The people at iFixit have shown that they’re still on top of their game by tearing down the new Kindle 2 eBook reader. The main processor is a 532MHz ARM-11 from Freescale. Interestingly, there isn’t any significant circuitry behind the large keyboard; it seems its existence is just to hide the battery.

Parking ticket leads to a virus

Parking ticket leads to a virus

Hackers have discovered a new way of duping users onto fraudulent websites: fake parking tickets. Cars in the US had traffic violation tickets placed on the windscreen, which then directed users to a website. The website claimed to have photos of the alleged parking violation, but then tricks users into downloading a virus. Anti-virus [...]

PETA’s Seakittens website “hacked”

PETA’s Seakittens website “hacked”

@ Omaha Steaks. Seakittens.com

Monster.com Attacked by Hackers Again

Monster.com Attacked by Hackers Again

The online job site Monster.com has been attacked by hackers resulting in lost user data on the site. Monster said “we recently learned our database was illegally accessed and certain contact and account data were taken, including Monster user IDs and passwords, email addresses, names, phone numbers, and some basic demographic data.” The [...]

HOWTO: Reprogram Road Signs

HOWTO: Reprogram Road Signs

Disclaimer: This "HOWTO" to posted for information only. These road signs are very common, are inherently insecure by design, and should be fixed. You should not tamper with these signs in any way, as someone might get hurt. This is the ADDCO portable sign. Today, you see what is on the inside, and briefly how they are "programmed" to display [...]

4chan strikes again with push to make symbol top Google search

4chan strikes again with push to make symbol top Google search

Offering a "snapshot of what’s on the public’s collective mind by viewing the fastest-rising searches for different points of time," Google Trends is a regular stop for those of us who spend the day searching for fresh meat to feed the beast we call the Posted news blog. Today's Hot Trends page, pictured to the right, serves up the usual [...]

 Page 3 of 6 « 1  2  3  4  5 » ...  Last »