Linux Kernels vulnerability since 2001 (and still working)
vulnerability in all Linux kernels since 2001
Attack of the killer PNGs
Apple on Wednesday patched 18 holes in its Mac OS X operating system, seven that could allow an attacker to remotely take over a machine when a user does nothing more than view a booby-trapped image.
Hackers expose weakness in visiting trusted sites
Hackers at the Black Hat and DefCon security conferences have revealed a serious flaw in the way Web browsers weed out untrustworthy sites and block anybody from seeing them. If a criminal infiltrates a network, he can set up a secret eavesdropping post and capture credit card numbers, passwords and other sensitive data flowing between computers on that network and sites their browsers have deemed safe.
Self-Destructing Digital Data
Vanish is a research system designed to give users control over the lifetime of personal data stored on the web or in the cloud. Specifically, all copies of Vanish encrypted data — even archived or cached copies — will becomepermanently unreadable at a specific time, without any action on the part of the user or any third party or centralized service.
Hackers Can Launch iPhone Attack Via SMS
Security experts at the Black Hat conference said Thursday that hackers can break into an iPhone to intercept text messages, deliver spam and deliver malware.
Birds tweet, friends call
Twitter: Do you think you have influence? Try to give orders to my dogs.
Can I hack myself?
Script kiddy asked me politely to hack myself and upload a shell for him. That's a challenge I never tough about.
Computer Shops In Data Access Scam
Investigation has found some computer repair shops are illegally accessing personal data from customers' hard drives, and even trying to hack into their bank accounts.
Nmap 5 released (with native GUI)
Another milestone in the development of ...
Twitter Confidential Files Distributed By Hacker
The hacker who hijacked a Twitter admin account in May has been distributing sensitive files taken from the company, ostensibly to educate people about the risks of poor computer security.