Earlier this year, a sullen, 28-year-old contractor in California was charged in federal court with sabotaging the computerized controls on oil-rig sitting off the coast, allegedly out of spite for…
>> CATEGORY: Security
It’s funny what you discover sometimes when you’re doing the daily trawl of things and looking for something to blog. Today was one of those days. I was scanning through…
Here’s a fun story. Police in Australia thought they were being mighty clever when they took over an “underground hacking forum.” (The forum is r00t-y0u.org, though it seems to be down right now.) One of the hackers on the forum then retaliated by breaking into police computers using a simple SQL injection. Security fail.
SoupNazi, and 2 others “unknown” Russian hackers are been sued for one the of biggest electonic robbery grabbing more than 130 million credit and debit cards.
vulnerability in all Linux kernels since 2001
Apple on Wednesday patched 18 holes in its Mac OS X operating system, seven that could allow an attacker to remotely take over a machine when a user does nothing more than view a booby-trapped image.
Hackers at the Black Hat and DefCon security conferences have revealed a serious flaw in the way Web browsers weed out untrustworthy sites and block anybody from seeing them. If a criminal infiltrates a network, he can set up a secret eavesdropping post and capture credit card numbers, passwords and other sensitive data flowing between computers on that network and sites their browsers have deemed safe.
Security experts at the Black Hat conference said Thursday that hackers can break into an iPhone to intercept text messages, deliver spam and deliver malware.
Investigation has found some computer repair shops are illegally accessing personal data from customers’ hard drives, and even trying to hack into their bank accounts.
The hacker who hijacked a Twitter admin account in May has been distributing sensitive files taken from the company, ostensibly to educate people about the risks of poor computer security.