Search

Results 81-100 of 184 for hacker.

Mumblehard Malware Mugs Linux Servers

A family of Linux malware targeting Linux and BSD servers has been lurking around for five years, Eset has reported. Dubbed "Linux/Mumblehard," the malware contains a backdoor and a spamming daemon, both written in Perl. The components are mainly Perl scripts encrypted and packed inside an executabl...

Leap Motion Faceplate Lets OSVR Head Talk to the Hand

Open Source Virtual Reality, a platform that aims to unify virtual reality input devices, games and output, and Leap Motion, a company that has established itself in the development of motion-tracking hardware, on Wednesday announced what may be a compelling way to control movements in a virtual rea...

Good and Samsung Partner to Harden Android Security

Good Technology on Tuesday announced a merger of its app container and app ecosystem with the Samsung KNOX enterprise security platform for Android. The product merger is the next step in the partnership aimed at eliminating virus and malware concerns that come with Android adoption in the enterpris...

There’s a GHOST in Linux’s Library

Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this week reported its discovery of GHOST, a vulnerability that allows attackers to remotely take contro...

Hacker Gives Google a Hand With Chrome-Android Compatibility

An unplanned convergence of Android apps and the Chrome OS may be setting the stage for a wide-open cross-platform architecture that combines Android and Chrome. Freelance programmer Vlad Filippov, aka "Vladikoff," discovered a way around Google's limitations on its ARC, or App Runtime for Chrome, w...

The Connected Car, Part 3: No Shortcuts to Security

The connected car is becoming a reality, but the gadget-filled roadways it travels will be paved with several options for in-car technologies. These choices pose challenges for carmakers. Whichever technology wins the race, one of the biggest concerns for OEMs is their electronic security. The Linux...

The Novena Open Hardware Laptop: A Hacker’s Dream Machine

Would you buy a high-end laptop built completely around open hardware and the Linux distro of your choice? Novena offers that opportunity, but it comes with an out-of-the-box experience that might be beyond the reach of the typical computer consumer. That said, the Novena laptop's experimental techn...

Researchers Find Android Security on Par With iOS

The open source Android operating system long has been considered by security experts to be the mobile OS most vulnerable to security threats, but iOS is just as vulnerable, Marble Security has found. However, the two OSes expose users to different types of threats. The perceived greater security of...

FOSS Community Hustles to Fix Gaping Heartbleed Flaw

A flaw in OpenSSL that has been around since 2011, the Heartbleed Bug, lets hackers steal information protected by the SSL/TLS encryption used to secure the Internet. Codenomics, which co-discovered the flaw at about the same time as Google's Neel Mehta, tested some of its own services and found it ...

WhatsApp Flaw Opens Database Doors to Hackers

An Android developer's disclosure that it's possible to hack into the WhatsApp database and read the text of the chats from another application could be a big headache for Facebook, which has agreed to purchase the app for $19 billion. "This is not a bug, but a design decision of WhatsApp," said Bas...

The Rise of the Ethical Hacktivist

When Saul Alinsky wrote Rules for Radicals more than four decades ago, the world was a very different place than it is today. Protests and demonstrations were among the most common tactics for bringing about social change, and they were used on such a broad scale that they helped define the...

BOOK REVIEW

‘Makers at Work’ Offers Inspiring Journey Through the Creative Process

The maker mentality has no starting point in modern history. People have always honed their creative skills to make things, and societies have always had visionaries who turned their garage hobbies and kitchen table inventiveness into industrial breakthroughs. Today, the maker mentality is essential...

EXCLUSIVE INTERVIEW

AlienVault’s Barmak Meftah: Time to Put Hackers on the Defensive

As CEO of AlienVault, Barmak Meftah faces enemies every day who play out their attacks from faraway lands using seemingly unbeatable weapons. One of the weapons AlienVault uses with the support of the open source community is a global report called the Open Threat Exchange that tracks threats to com...

LINUX PICKS AND PANS

OpenPGP Studio Keeps Prying Eyes Off Your Personal Data

GoAnywhere OpenPGP Studio is an easy-to-use, cross-platform desktop tool by Linoma Software that protects files using the OpenPGP encryption standard. Why opt for this relative newcomer instead of other, more mature open standards-based encryption solutions? If for no other reason, OpenPGP Studio is...

EXCLUSIVE INTERVIEW

Shutterstock’s Chris Fischer: Making the Most of Open Source’s ‘Huge Tech Edge’

Shutterstock has a nearly insatiable appetite for data storage. From its inception, the company -- a global provider of licensed photographs, vectors, illustrations and videos -- refused to pay higher prices just to stuff its storage needs into somebody else's cloud. Instead, the almost 10-year-old ...

The Windows Kernel’s Achilles’ Heel

Life is like a roller coaster, as the popular saying goes, filled with both ups and downs. Here in the Linux blogosphere we've certainly experienced our share of downs in recent months -- thanks in large part to a frustrating spate of FUD -- but lately the clouds have parted and the sun is shining o...

Lame U/P Combos Make WordPress Irresistible to Hackers

An attack of unprecedented proportions has been hitting sites using WordPress, a free and open source blogging tool and content management system that powers more than 60 million websites worldwide. Attacks have been launched from more than 90,000 IP addresses, according to HostGator. CloudFlare sai...

EXCLUSIVE INTERVIEW

Fedora Project’s Robyn Bergeron: The Linux Desktop Is Almost Ready for Its Close-Up

The Fedora Project is perhaps one of the hallmark Linux distributions. Fedora is sponsored by Red Hat, the commercial developer of Red Hat Enterprise Linux (RHEL). Red Hat's investment in the Fedora community is collaborative. As such, Fedora Linux releases often provide RHEL developers with a field...

Analyst: Flame Devs Used FOSS to Help Them Hide

The developers of the now-notorious Flame malware used command and control servers running the 64-bit version of Debian and the OpenVz virtualization technology in their work. They wrote most of the server code in PHP, researchers at Kaspersky Lab and Symantec have found during continuing investigat...

Power Strip’s a Penetration Testing Tool in Disguise

Advanced penetration testing product maker Pwnie Express has unveiled a new tester that looks just like a power strip. The Power Pwn is a fully integrated enterprise-class device that can be used over Ethernet, wireless or Bluetooth connections. It is priced at $1,300 and is currently available for ...

LinuxInsider Channels