Home Tags Hacking

Tag: Hacking

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the ‘hacker’ as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people’s computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.

Cyber-Attacks Continue to Be Financially Motivated, Verizon Finds

Verizon's 2017 Data Breach Investigations Report finds that hacking and malware are the leading causes of breaches, with ransomware use growing.

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation.SNMP is used for automated network device identification, monitoring and remote configuration.
It is supported and enabled by default in many devices, including servers, printers, networking hubs, switches and routers.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]Independent researchers Ezequiel Fernandez and Bertin Bervis recently found a way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers.To read this article in full or to leave a comment, please click here

Lawsuit: Fox News group hacked, surveilled, and stalked ex-host Andrea Tantaros

Lawsuit: After a sexual harassment claim, Fox News planted spyware on ex-host's computer.

Ars Technica Live: Why it’s important to defend hackers, even the...

Lawyer Mark Jaffe has represented weev, Matthew Keys, and Deric Lostutter.

Super-secure Pi-stuffed nomx email server box given a good probing

Researcher claims it's riddled with flaws.
Vendor denies it Security researchers claim to have uncovered a variety of serious security holes in a heavily touted secure email server technology. Nomx, the firm behind the device, strongly disputes the claims and has challenged researchers to a hacking challenge, involving the creation of an email account on a designated remotely hosted nomx device.…

Foiled! 15 tricks to hold off the hackers

Malicious hackers have outsize reputations.

They are über-geniuses who can guess any password in seconds, hack any system, and cause widespread havoc across multiple, unrelated networks with a single keystroke—or so Hollywood says.

Those of us who fight hackers every day know the good guys are usually far smarter. Hackers simply have to be persistent.Each year, a few hackers do something truly new.

But for the most part, hackers repeat the tried and true.
It doesn’t take a supergenius to check for missing patches or craft a social engineering attack. Hacking by and large is tradework: Once you learn a few tricks and tools, the rest becomes routine.

The truly inspired work is that of security defenders, those who successfully hack the hackers.To read this article in full or to leave a comment, please click here

The first Kirby game was programmed without a keyboard

Sakurai programmed the Game Boy classic with a trackball and a Famicom Twin.

Air Force Hopes To Attract Hackers With Bug Bounty Program

The Hack the Air Force bug bounty program invites white hats from inside and outside the U.S. to hack its websites.

USAF Launches ‘Hack the Air Force’

Bug bounty contest expands Defense Department outreach to the global hacker community to find unknown vulnerabilities in DoD networks.

Expedia IT bod gets all-expenses-paid trip to prison after hacking execs’...

Blames pricey SF rent for $350,000 insider-trading scam An ex-Expedia IT admin has been fined and jailed for 15 months after he spied on the emails of the travel giant's top brass and made insider trades.…

Hyundai Mobile App Patched for Car Hacking Vulnerabilities

Security firm Rapid7 discloses flaws in Hyundai Motor America's Blue Link mobile app that could have potentially enabled a hacker to attack a vehicle.