Blog Posts Tagged with "Hacker"

69dafe8b58066478aea48f3d0f384820

World's Greatest Hacker Sanctioned in World's Worst Lawsuit

April 13, 2011 Added by:Headlines

"If Evans wants to be considered a credible source of information or technical security, he needs to actually work at getting certifications and accrue respect through solid work within the community. Until he does this, he will always have critics that will call him a charlatan..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

T.J.Maxx Hacker Claims Fed's Authorized Activities

April 08, 2011 Added by:Headlines

"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iranian Hacker Claims Comodo Digital Certificate Heist

March 28, 2011 Added by:Headlines

The supposed lone-hacker now claiming responsibility, who dubbed him or herself "Comodohacker", said in their statement that the attack on Comodo was in retaliation for the release of the Stuxnet virus that damaged equipment at Iran's Natanz uranium enrichment facility...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TripAdvisor Member Emails Stolen by Hacker

March 25, 2011 Added by:Headlines

"This is the second time a well known website has been breached this week – just a few days ago it was Play.com with egg on its face, now it’s TripAdvisor. It’s the regularity of these types of incident that suggest traditional approaches to IT security are no longer fit for purpose..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EMC's Security Division Hacked

March 18, 2011 Added by:Headlines

"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Twitter Settles with FTC Over Data Privacy and Security

March 14, 2011 Added by:Headlines

“Twitter has engaged in a number of practices that, taken together, failed to provide reasonable and appropriate security to: prevent unauthorized access to nonpublic user information and honor the privacy choices exercised by its users in designating certain tweets as nonpublic..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Q and A with Hacker "srblche srblchez"

January 28, 2011 Added by:Rafal Los

An independent attacker who writes their own scripts and hacks in 'a couple of seconds' is your worst nightmare as a security professional, mostly because the velocity of attack is so great and the likelihood of being caught in a detection system like an IPS is so low...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Hacker Hits Mark Zuckerberg's Facebook Fan Page

January 26, 2011 Added by:Headlines

"Let the hacking begin: If facebook needs money, instead of going to the banks, why doesn’t Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a ‘social business’ the way Nobel Price winner Muhammad Yunus described it? http://bit.ly/fs6rT3 What do you think?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacked .GOV .MIL and .EDU Sites for Sale

January 22, 2011 Added by:Headlines

"The victims' vulnerabilities were probably obtained by SQL injection vulnerability automatic scanner and exploited in automatic manner, as the hacker published his methods in a post in some hacker forum – see screen shot and explanation..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Is Sandboxing the End-All Solution?

January 01, 2011 Added by:Dan Dieterle

When you have millions of lines of code, like you have in an Operating System, you will have bugs. Hackers can use these coding bugs to create exploits. Microsoft and Adobe products have been a favorite target for hackers. But how do you protect software from hackers when there are unknown bugs?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Unpatched Internet Explorer Flaw Leaves PCs Vulnerable

December 27, 2010 Added by:Headlines

The flaw is present in IE versions 6 through 8,and will allow the injection of malicious code if a user visits websites designed to exploit the vulnerability by exploiting how the browser controls a computer's memory when processing the instructions for the presentation of a webpage, the CSS...

Comments  (0)

E1ee35e6f304499783d31cafb08e1d81

Protecting the Innocent – Sometimes From Themselves

December 20, 2010 Added by:Greg George

All familiar headlines we see too often. At every turn there is someone who wants what you have and will go to extraordinary means to acquire anything they wish. Moreover, most victims are unaware of how easily they can be taken...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

2010: The Year Cyber Threats Went Social

December 20, 2010 Added by:Simon Heron

We have gone from rogue nations launching attacks on their rivals’ military services to political activists who want to help bring down websites in the run up to Christmas as a form of protest against perceived censorship. One thing is certain, the cyber threat landscape is always adapting...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obstacles May Hinder Anonymous DDoS Prosecutions

December 17, 2010 Added by:Headlines

The level of effort and resources needed to gather evidence, identify suspects, issue warrants, carry out arrests, and arrange extraditions before prosecution can even occur may make the likelihood multiple legal actions in the matter cost prohibitive...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Thirteen Million deviantART Accounts Exposed

December 17, 2010 Added by:Headlines

The exposure was due to security lapses at Silverpop System, a marketing company that handles member communications for deviantART. The companies stated that no passwords were accessed, and that the biggest threat will be an influx of SPAM for the account holders exposed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Ten Biggest Hacking Exploits in Twenty-Five Years

December 15, 2010 Added by:Headlines

In the wake of the recent WikiLeaks and Gawker episodes, Brian Ries has compiled a list of the the 10 most destructive attacks of the last 25 years. From data theft to DDoS, worms to scams, Ries has assembled a pretty darn good survey of the best of the worst cyber miscreants have had to offer...

Comments  (0)

Page « < 1 - 2 - 3 > »