Welcome Guest | Sign In
LinuxInsider.com
Is It Time to Trash Flash?
February 04, 2015
On Monday, Adobe Flash Player users were hit by a zero-day flaw for the third time in two weeks. The company issued a security advisory for the vulnerability, which it dubbed CVE-2015-0313. The flaw exists in Flash Player 16.0.0.296 and earlier versions on Windows and Macintosh platforms. Successful exploitation could crash the desktop and potentially let hackers take control of it, Adobe warned.
There's a GHOST in Linux's Library
January 28, 2015
Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this week reported its discovery of GHOST, a vulnerability that allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials.
POS Terminals Rich Vein for Gold-Digging Hackers
January 28, 2015
Hackers are like gold miners. Once they find a rich vein for their malware, they mine it until it's dry. Point-of-sale terminals are such a vein, and it doesn't appear that it's one that's about to run dry any time soon. Following the success of the Target breach in 2013, the hacker underground was quick to rush more POS malware to market.
Businesses Seek Liability Protection for Cybersecurity Disclosures
January 28, 2015
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that compromise national security or disrupt commerce is only going to get more difficult in the future.
White House Jump-Starts Cybersecurity Protection Programs
January 23, 2015
As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for additional legislation to improve information technology protection.
Businesses Waste Big Bucks Fighting Phantom Cyberattacks
January 21, 2015
Businesses spend an average of $1.27 million a year chasing cyberthreats that turn out to be dead ends. That is one of the findings in a report released last week on the cost of containing malware. In a typical week, an organization can receive nearly 17,000 malware alerts, although only 19 percent of them are considered reliable, the researchers found.
Warning Sony of Coming Storm Wasn't NSA's Department
January 19, 2015
The United States National Security Agency reportedly knew in advance that North Korea was about to hack into Sony's systems. The NSA apparently penetrated North Korea's network through several vectors, including Chinese networks used to connect with the rest of the world and hacker connections in Malaysia. The NSA was able to burrow in using the networks of South Korea and other allies.
Hacking as a Service Hits the Mainstream
January 19, 2015
A fledgling website created last fall connects hackers with clients willing to pay for their services. Nearly 50 hackers have listed their services on Hacker's List so far, for tasks including data recovery, penetration testing and computer forensics. More than 500 hacking jobs reportedly had been out to bid as of last week, with prices ranging from $100 to $5,000.
Sony Sortie's Smoking Gun Still Missing
January 14, 2015
Recent research from security firm Cloudmark has raised doubt about the purported connection between North Korea and last November's intrusion on Sony Pictures Entertainment's computer networks. The FBI last week continued to press its case that North Korea was behind the cyberattack, pointing to an exposed block of IP addresses allocated to North Korea.
The Convoluted Trail Linking North Korea to Sony
January 13, 2015
FBI Director James Comey has "very high confidence" that North Korea was behind last November's cyberattack on Sony, he said last week at Fordham University. New evidence of the link includes documentation of the hackers' failure to cover their tracks with proxy servers on several occasions, Comey said. Several times they got "sloppy" and exposed their home IP addresses.
The Fallout From the NSA's Backdoors Mandate
January 13, 2015
The United States National Security Agency (NSA) is widely believed to have mandated high-tech vendors build backdoors into their hardware and software. Reactions from foreign governments to the news are harming American businesses and, some contend, may result in the breakup of the Internet. For example, Russia is moving to paper and typewriters in some cases to move certain types of information.
Data Breach Law Tops Obama Privacy Initiatives
January 12, 2015
A proposed national data breach reporting law, aimed primarily at protecting consumer privacy, headlined several initiatives the Obama administration announced Monday. The Personal Data Notification & Protection Act clarifies the obligations of companies when there's been a data breach. It includes a requirement to notify customers within 30 days of the discovery of a breach.
Thieves Take $5M Bite Out of Bitcoin Exchange
January 07, 2015
An estimated $5.2 million was stolen over the weekend from Bitstamp, a digital currency exchange. It has suspended services pending an investigation. The company assured its customers that bitcoins held with Bitstamp prior to suspension of services were completely safe and would be honored in full. Bitstamp on Sunday discovered that some of its operational wallets had been compromised.
Fingerprint Theft Just a Shutter Click Away
January 07, 2015
Ever since smartphone makers started incorporating fingerprint scanners as a means of unlocking mobile phones, the Chaos Computer Club has attacked the technology with vigor. Not long after Apple added Touch ID to its iPhones, the German hackers demonstrated how to lift prints from a surface and create a flexible pad containing the print that could be used to break into a phone.
Hackers Give Touch ID the Finger
December 29, 2014
Hacker Jan Krissler, aka "Starbug," this weekend told attendees at the 31st Chaos Computer Club convention that he had replicated the fingerprints of German Defense Minister Ursula von der Leven using a standard photo camera and commercially available software. Krissler used a close-up of a photo of the minister's thumb and other pictures taken at different angles during a press event in October.
Flaws in Ancient Standard Enable Wireless Eavesdropping, Spying
December 23, 2014
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities.
The Untold Stories of 2014
December 22, 2014
It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch much or any real air. Some, like what is really behind Sony's decision to pull The Interview still might take off. Hadoop analytics is one of the most powerful platforms to come to market, and one vendor stands out above all others: Cloudera.
Google Calls In Legal Eagles in MPAA Piracy Skirmish
December 19, 2014
Google has filed a lawsuit against Mississippi Attorney General Jim Hood, the latest salvo in its piracy battle with the Motion Picture Association of America. Hood targeted Google with an "unreasonable, retaliatory and burdensome" subpoena, the complaint says. The referenced subpoena likely is part of a coordinated campaign against Google known as "Project Goliath."
US Mulls Response to Sony Hack
December 19, 2014
Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options" to take in response to the Sony hack. The hack is "very serious," Johnson said, though he refused to label it as a terrorist attack. There has been widespread suspicion that North Korea engineered the hack. The FBI is investigating.
Terrorist Threats May Blow Up 'The Interview's' Box Office
December 17, 2014
The now-notoriously controversial action comedy The Interview, which was expected to deliver profits of $90-$95 million for Sony, may have become a financial black hole. The movie's Thursday premiere in New York has been cancelled, and several movie theater chains have scrapped plans to screen it, following a hacker message referencing 9/11 and threatening physical attacks on theaters.
Sony Sends News Outlets a Stern but Toothless Warning
December 16, 2014
On behalf of Sony Pictures Entertainment, high-powered attorney David Boies has sent a letter to several news outlets demanding that they refrain from publishing stories based on material hackers recently stole from the company and that they destroy the pilfered data. The letter to the news organizations claims the stolen information is "protected under U.S. and foreign legal doctrines."
Sony May Have Succumbed to DDoS Temptation
December 15, 2014
Sony reportedly has used Amazon Web Services to launch distributed denial of service attacks on sites carrying files stolen from its network. Those attacks apparently involved "hundreds of computers" in Tokyo and Singapore. Amazon reportedly issued a statement denying the claim, but the language it used was vague: "The activity being reported is not currently happening on AWS."
No Respite for Sony
December 12, 2014
Since the hacker group calling itself "Guardians of Peace" announced its attack on Sony Pictures Entertainment late last month, things have gone downhill for the company. After confidential documents were leaked to the Internet over several days, a denouement of sorts was reached last week, when a security company examining the stolen data discovered nearly 50,000 Social Security numbers.
NSA's Auroragold Mining Operation
December 10, 2014
The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with major cellphone network operators worldwide since 2010.

See More Articles in Hacking Section >>
Facebook Twitter LinkedIn Google+ RSS
Are you looking forward to self-driving cars?
You bet -- I'd love to have a built-in chauffeur.
Yes -- self-driving cars will save lives.
Kind of -- I'd like some self-driving features, like parking.
No -- self-driving cars are too dangerous.
No -- I don't want to give up another freedom.
Absolutely not -- I saw Terminator and I'm not letting some robot take me for a ride!
PENN STATE ONLINE Information Technology Degrees and Certificates