Blog Posts Tagged with "Hacks"


Father Noel Delivers His Second Lump of "LulzXmas" to Stratfor

December 27, 2011 Added by:Kevin McAleavey

While many of us were nestled in our beds and enjoying Christmas day with family and friends, opening our gifts and downing the holiday grog, a nasty lump of coal was left once again under the tree for Stratfor by the LulzSec/Lulzboat crew...

Comments  (0)


RSA Fail - Security Lessons Unlearned

March 18, 2011 Added by:J. Oquendo

Security pros have to wonder about the security state as a whole when the founders of "two factor" key fobs take a hit. One would believe that in the event someone compromised a machine inside of RSA, their own security - two factor key fobs - would have prevented escalation between other machines...

Comments  (6)


iPhone Hacked and Passwords Stolen in Six Minutes

February 12, 2011 Added by:Dan Dieterle

iPhone passwords may not be as secure as one might believe. According to German security researchers from the Fraunhofer Institute Secure Information Technology (Fraunhofer SIT), if you have physical access to the phone, passwords can be recovered from a locked Apple iPhone in six minutes...

Comments  (2)


Six Hot New Hacks from Black Hat DC 2011

January 25, 2011 Added by:Headlines

Michael Gregg has assembled his picks for the top six hacks revealed at the Black Hat DC 2011 conference. Dozens of innovative threats were revealed at the conference last week, but Gregg describes these particular exploits as being the "six new hacks that will make your CSO cringe"...

Comments  (0)


New Hack Makes Smartphones Mobile Spy Bugs

January 20, 2011 Added by:Headlines

Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...

Comments  (0)


Hackers Crack the PS3 and Multi-touch iPod Nano

January 03, 2011 Added by:Headlines

The PS3 has been a veritable fortress since it came on the market in 2006, but a team of hackers has found a vulnerability in the unit's software that allows a bypass of the console's operating system...

Comments  (0)


Six Cool Hacks from 2010

December 28, 2010 Added by:Headlines

Kelly Jackson Higgins has assembled an examination of six "cool" hacks from 2010. The list has a little of everything from the ethical to the not so ethical of hackers, many made headlines, and some are little known...

Comments  (0)


The 0Exploit Privilege Escalation

July 21, 2010 Added by:Rob Fuller

Routing only sends the module through the session. Once the payload runs for exploit modules, it's is calling straight back to the LHOST attacker box, not through the session. So, you can now exit session 1 NETWORK SERVICE, as it's not really needed any more...

Comments  (0)


Certified Ethical Hacker Courses - Again…

July 20, 2010 Added by:Lee Mangold

The exam is in revision 6 now, and tests a wide range of techniques from reading and analyzing TCP dumps and Snort logs, understanding the OSI model, how to use many of the common exploit tools, recognizing the exploits and their uses, and so on...

Comments  (4)


AV Bypass Made Stupid

July 13, 2010 Added by:Rob Fuller

I started with fgdump, a well known hashdumping/pwdump tool. It’s detected by 80% of all AVs and by all the top 10. You see this on your AV report for your domain controller, and you’re having a bad day, probably week...

Comments  (1)


Should we be afraid of Chinese hackers? ...Or lost cyber war (Part III)

May 04, 2010 Added by:Roman Zeltser

In addition to the full access to Windows OS that proved to be vulnerable to endless exploits, China chooses FreeBSD as basis for secure OS. The Washington Times recently reported that "China has developed more secure operating software for its tens of millions of computers and is already installing it on government and military systems, hoping to make Beijing's networks impenetrable to U.S. ...

Comments  (5)


How to Detect a Mac Flooding Attack

April 15, 2010 Added by:Ray Tan

Ever since the beginning of the Internet, we have been facing ever increasing threats which can affect the stability and usability of your network. Nowadays, our businesses rely on their networks and the Iinternet more and more, but how can we prevent being attacked by hackers?

Comments  (0)


Sometimes, some stuff should just stay private...

April 01, 2010 Added by:Jason Remillard

As reported in the past few days, a site selling  Durex condoms have had a small 'exposure' problem.  As reported, the site had been suffering (time length unknown) from several basic security exposures, including even allowing orders to be viewed online, without a login - simply by changing the order number!

Comments  (0)


Big Brother Has the Power to Turn Off Your Car

March 22, 2010 Added by:Theresa Payton

As our world becomes more automated and every day gadgets are infused with computer machinery, you are more at risk of a glitch, or worse. Over 100 car owners in Austin, TX had the worst surprise ever recently.   Cars began behaving badly - they would not turn on or the horns were honking.

Comments  (11)


Hacker Releases Second Video of Enhanced XerXeS DoS Attack on Apache Vulnerability

March 11, 2010 Added by:Anthony M. Freed

Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.

Comments  (15)


Google, Adobe, and Big Oil Attack Commonalities

March 07, 2010 Added by:Ted LeRoy

The work of protecting information is becoming more difficult with time.  The recently discovered attacks on Google, Adobe, Marathon Oil, ExxonMobil, and ConocoPhillips illustrate an alarming trend.  The attacks even gave rise to a new attack model, the Advanced Persistent Threat (APT).

Comments  (0)

Page « < 1 - 2 > »