| Tuesday July 29th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘hax’ Archives

This can’t be called Hacking when it’s this easy.

This can’t be called Hacking when it’s this easy.

Click here. For the unknowing... phpmyadmin is a web-based mysql admin tool. The google query is structured to find installs of phpmyadmin that aren't password protected. This gives anyone full access to read and modify the database. Also, if the pages were password-protected, Google's spider wouldn't have been able to get in to index them in [...]

Experts hack power grid in no time

Experts hack power grid in no time

SAN FRANCISCO -- Cracking a power company network and gaining access that could shut down the grid is simple, a security expert told an RSA audience, and he has done so in less than a day. Ira Winkler, a penetration-testing consultant, says he and a team of other experts took a day to set up attack tools they needed then launched their attack, [...]

UPDATE: With Vista breached, Linux unbeaten in hacking contest

UPDATE: With Vista breached, Linux unbeaten in hacking contest

Does anybody know what distribution was used? Something like RedHat or Fedora is pretty significantly hardened right "out of the box", where there are other distros that aren't as locked-down. The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on the last day of the contest; but it was Linux, running on a Sony [...]

Macbook Air Hacked in 2 mintues

Macbook Air Hacked in 2 mintues

San Francisco - It may be the quickest $10,000 Charlie Miller ever earned. He took the first of three laptop computers -- and a $10,000 cash prize -- Thursday after breaking into a MacBook Air at the CanSecWest security conference's PWN 2 OWN hacking contest. Show organizers offered a Sony Vaio, Fujitsu U810, and the MacBook as prizes, [...]

Hacking Vista’s Smart Cards

Hacking Vista’s Smart Cards

Former Microsoft security team member will demonstrate how his new fuzzer hacks smart card plug-in The recent wave of smart card hacks have been aimed mainly at the card’s chip and bypassing physical security, but not this latest one: A former Microsoft security team member has demonstrated an attack that compromises the smart [...]

A Heart Device Is Found Vulnerable to Hacker Attacks

A Heart Device Is Found Vulnerable to Hacker Attacks

To the long list of objects vulnerable to attack by computer hackers, add the human heart. The threat seems largely theoretical. But a team of computer security researchers plans to report Wednesday that it had been able to gain wireless access to a combination heart defibrillator and pacemaker. They were able to reprogram it to shut down [...]

Windows NT UNICODE Vulnerability Analysis

Windows NT UNICODE Vulnerability Analysis

It can be argued that the main purpose for computer systems is fast and reliable communication from one system to another. How is that accomplished? What allows a computer running an English operating system to communicate with one running a Russian operating system? Both have different human readable alphabets. Both have different character [...]

The Pirates Can’t Be Stopped

The Pirates Can’t Be Stopped

The following is a decent article about when "Ethan" hacked into the MediaDefender company, at the end of 2006... From: Ty Heath Sent: Wednesday, June 6, 2007 7:02 p.m. To: it Subject: pm webserverThe 65.120.42.146 pm webserver has been compromised As a side note, please do not ever use the old passwords on anything. "The first time [...]

CIA Says Hackers Have Cut Power Grid

CIA Says Hackers Have Cut Power Grid

Several cities outside the U.S. have sustained attacks on utility systems and extortion demands. Criminals have been able to hack into computer systems via the Internet and cut power to several cities, a U.S. Central Intelligence Agency analyst said this week. Speaking at a conference of security professionals on Wednesday, CIA analyst Tom [...]

VoIP For iPod Touch is Here

The Touchmods team have released version 1.0 of SIP-VoIP for the iPod Touch. This hack will allow the Touch to make phone calls over its WiFi connection. Although named version 1.0, it is most certainly still a beta, and will take some special magic on your part to get things going. Link

The Five Coolest Hacks of 2007

The Five Coolest Hacks of 2007

Nothing was sacred – not cars, not truckers, not even the stock exchange. Hackers are creative folk, for sure. But some researchers are more imaginative and crafty than others. We're talking the kind of guys who aren't content with finding the next bug in Windows or a Cisco router. Instead, they go after the everyday things we take for [...]

Homebrew camera phone se-cam looks like a bomb

Homebrew camera phone se-cam looks like a bomb

Here's a brilliant rube goldberg security camera made out of a camera phone, some homebrew circuits and solenoid relays. When the phone is called, it activates the relays, which tap out the "take picture/send picture" sequence on the phone-keypad, which then takes the pic and sends it off. Added bonus: this thing actually looks sinister. If I were [...]

HOWTO: Watch the Fox Prison Break American Express exclusive without a card

HOWTO: Watch the Fox Prison Break American Express exclusive without a card

Tried to catch up on the Prison Break highlights and came across the Amex Only previews. Well since I don't have an AMEX there's only one choice. Google American Express support numbers. Enter any one of these phone number numbers: 8004924920 8004928468 8005216121 8005253355 8005282122 8005284800 then enter anything longer than 5 [...]

How Hackers Work

How Hackers Work

HowStuffWorks takes a stab at separating a real hacker from what the media and public consider a hacker. Considering every script kiddie considers himself the l33t h@x3r this article is pretty good. Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to [...]

 Page 6 of 6  « First  ... « 2  3  4  5  6