Blog Posts Tagged with "Hacks"

Ba829a6cb97f554ffb0272cd3d6c18a7

Father Noel Delivers His Second Lump of "LulzXmas" to Stratfor

December 27, 2011 Added by:Kevin McAleavey

While many of us were nestled in our beds and enjoying Christmas day with family and friends, opening our gifts and downing the holiday grog, a nasty lump of coal was left once again under the tree for Stratfor by the LulzSec/Lulzboat crew...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

RSA Fail - Security Lessons Unlearned

March 18, 2011 Added by:J. Oquendo

Security pros have to wonder about the security state as a whole when the founders of "two factor" key fobs take a hit. One would believe that in the event someone compromised a machine inside of RSA, their own security - two factor key fobs - would have prevented escalation between other machines...

Comments  (4)

B64e021126c832bb29ec9fa988155eaf

iPhone Hacked and Passwords Stolen in Six Minutes

February 12, 2011 Added by:Dan Dieterle

iPhone passwords may not be as secure as one might believe. According to German security researchers from the Fraunhofer Institute Secure Information Technology (Fraunhofer SIT), if you have physical access to the phone, passwords can be recovered from a locked Apple iPhone in six minutes...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Six Hot New Hacks from Black Hat DC 2011

January 25, 2011 Added by:Headlines

Michael Gregg has assembled his picks for the top six hacks revealed at the Black Hat DC 2011 conference. Dozens of innovative threats were revealed at the conference last week, but Gregg describes these particular exploits as being the "six new hacks that will make your CSO cringe"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Hack Makes Smartphones Mobile Spy Bugs

January 20, 2011 Added by:Headlines

Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

Home Depot Website Hack

January 11, 2011 Added by:Mark Baldwin

While the iframe in the Home Depot website is not currently a threat, the vulnerability that allowed it to be inserted into the page may still be present. I attempted to contact Home Depot to inform them of this issue, but as of this writing I have not received a response...

Comments  (19)

69dafe8b58066478aea48f3d0f384820

Hackers Crack the PS3 and Multi-touch iPod Nano

January 03, 2011 Added by:Headlines

The PS3 has been a veritable fortress since it came on the market in 2006, but a team of hackers has found a vulnerability in the unit's software that allows a bypass of the console's operating system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Six Cool Hacks from 2010

December 28, 2010 Added by:Headlines

Kelly Jackson Higgins has assembled an examination of six "cool" hacks from 2010. The list has a little of everything from the ethical to the not so ethical of hackers, many made headlines, and some are little known...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

The 0Exploit Privilege Escalation

July 21, 2010 Added by:Rob Fuller

Routing only sends the module through the session. Once the payload runs for exploit modules, it's is calling straight back to the LHOST attacker box, not through the session. So, you can now exit session 1 NETWORK SERVICE, as it's not really needed any more...

Comments  (0)

Af2769c2480db78c589b811b428782b0

Certified Ethical Hacker Courses - Again…

July 20, 2010 Added by:Lee Mangold

The exam is in revision 6 now, and tests a wide range of techniques from reading and analyzing TCP dumps and Snort logs, understanding the OSI model, how to use many of the common exploit tools, recognizing the exploits and their uses, and so on...

Comments  (4)

D8853ae281be8cfdfa18ab73608e8c3f

AV Bypass Made Stupid

July 13, 2010 Added by:Rob Fuller

I started with fgdump, a well known hashdumping/pwdump tool. It’s detected by 80% of all AVs and by all the top 10. You see this on your AV report for your domain controller, and you’re having a bad day, probably week...

Comments  (1)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war (Part III)

May 04, 2010 Added by:Roman Zeltser

In addition to the full access to Windows OS that proved to be vulnerable to endless exploits, China chooses FreeBSD as basis for secure OS. The Washington Times recently reported that "China has developed more secure operating software for its tens of millions of computers and is already installing it on government and military systems, hoping to make Beijing's networks impenetrable to U.S. ...

Comments  (5)

85ac6feb584b665e85664974c546cfec

How to Detect a Mac Flooding Attack

April 15, 2010 Added by:Ray Tan

Ever since the beginning of the Internet, we have been facing ever increasing threats which can affect the stability and usability of your network. Nowadays, our businesses rely on their networks and the Iinternet more and more, but how can we prevent being attacked by hackers?

Comments  (0)

Ba5964a1284ac16d4277991e7225699c

Sometimes, some stuff should just stay private...

April 01, 2010 Added by:Jason Remillard

As reported in the past few days, a site selling  Durex condoms have had a small 'exposure' problem.  As reported, the site had been suffering (time length unknown) from several basic security exposures, including even allowing orders to be viewed online, without a login - simply by changing the order number!

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Big Brother Has the Power to Turn Off Your Car

March 22, 2010 Added by:Theresa Payton

As our world becomes more automated and every day gadgets are infused with computer machinery, you are more at risk of a glitch, or worse. Over 100 car owners in Austin, TX had the worst surprise ever recently.   Cars began behaving badly - they would not turn on or the horns were honking.

Comments  (11)

6d117b57d55f63febe392e40a478011f

Hacker Releases Second Video of Enhanced XerXeS DoS Attack on Apache Vulnerability

March 11, 2010 Added by:Anthony M. Freed

Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.

Comments  (15)

Page « < 1 - 2 > »