September 2009

30 September, 2009

Good hackers meet to seek ways to stop the bad hackers – PhysOrg.com

Good hackers meet to seek ways to stop the bad hackers
PhysOrg.com
That's an early technology that's potentially susceptible to hacking," Laykin said. "Now if I can hack a computer, why can't I hack somebody's defibrillator

Source: hacking – Google News

Filed under Blog by

Banking Trojan steals money from under your nose – CNET News

Banking Trojan steals money from under your nose
CNET News
The moment banks will admit the problem and admit they need to change their attitude towards security, then breaking and hacking and commiting fraud will

and more »

Source: hacking – Google News

Filed under Blog by

2012: Soren Ulfert Needs Your Help Hacking into the IHC! – MovieViral

2012: Soren Ulfert Needs Your Help Hacking into the IHC!
MovieViral
Looks like Soren Ulfert, formerly of the IHC, has finally found a purpose to his life after being abruptly fired from his position as

Source: hacking – Google News

Filed under Blog by

29 September, 2009

Malware worldwide grows 15 percent in September – CNET News

Malware worldwide grows 15 percent in September
CNET News
Anyone have any pointers to further info on this? by willbw September 29, 2009 1:27 PM PDT I think its really cute that 6078 of these say "Hacking Tools"

and more »

Source: hacking – Google News

Filed under Blog by

Perry’s live campaign speech Webcast ‘sabotaged’ – News 8 Austin

Perry's live campaign speech Webcast 'sabotaged'
News 8 Austin
The Web site says the hacking prevented thousands of users from viewing the governor's remarks. "This planned and coordinated attack was political sabotage,

and more »

Source: hacking – Google News

Filed under Blog by

Current trends in cyber attacks on mobile and embedded systems – Embedded Computing Design (press release)

Current trends in cyber attacks on mobile and embedded systems
Embedded Computing Design (press release)
With the advent of the "Internet of things," we are encountering a new wave of hacking that threatens mobile devices as well as wired computers and networks

Source: hacking – Google News

Filed under Blog by

Slate hack: Apple’s hypocritical by blocking beleaguered Palm’s … – MacDailyNews


Siliconrepublic.com
Slate hack: Apple's hypocritical by blocking beleaguered Palm's
MacDailyNews
Manjoo continues, "Palm had to resort to hacking only because Apple closed down any legal paths for entry—making illegal the very same sort of compatibility
Palm NOT Re-hacking itunes Sync, but ARE Alienating Developers?the iPhone Blog (blog)

all 181 news articles »

Source: hacking – Google News

Filed under Blog by

This programme is on air now: – BBC News

This programme is on air now:
BBC News
In Japan the Digital Planet team finds out how to deal with neighbours hacking in to our next generation wi-fi kit: just brush them aside, with some very

Source: hacking – Google News

Filed under Blog by

Today, 01:32 on BBC World Service – BBC News

Today, 01:32 on BBC World Service
BBC News
In Japan the Digital Planet team finds out how to deal with neighbours hacking in to our next generation wi-fi kit: just brush them aside, with some very

Source: hacking – Google News

Filed under Blog by

Tomorrow, 01:32 on BBC World Service – BBC News

Tomorrow, 01:32 on BBC World Service
BBC News
In Japan the Digital Planet team finds out how to deal with neighbours hacking in to our next generation wi-fi kit: just brush them aside, with some very

Source: hacking – Google News

Filed under Blog by

Today, 20:32 on BBC World Service – BBC News

Today, 20:32 on BBC World Service
BBC News
In Japan the Digital Planet team finds out how to deal with neighbours hacking in to our next generation wi-fi kit: just brush them aside, with some very

Source: hacking – Google News

Filed under Blog by

Today, 16:32 on BBC World Service – BBC News

Today, 16:32 on BBC World Service
BBC News
In Japan the Digital Planet team finds out how to deal with neighbours hacking in to our next generation wi-fi kit: just brush them aside, with some very

Source: hacking – Google News

Filed under Blog by

Data Breach Trends: How to Avoid a Hack – BankInfoSecurity.com


BankInfoSecurity.com
Data Breach Trends: How to Avoid a Hack
BankInfoSecurity.com
They are working behind the scenes from a hacking standpoint to develop malware for use in these environments that they are targeting, and some of the

and more »

Source: hacking – Google News

Filed under Blog by

Banks oppose computer crime law proposal – The Copenhagen Post

Banks oppose computer crime law proposal
The Copenhagen Post
Losses to computer hacking have been limited in Denmark compared with other countries, but the Financial Supervisory Authority is concerned that a new wave

Source: hacking – Google News

Filed under Blog by

Criminals Hacking Facebook Accounts for Stealing Identity – SPAMfighter News

Criminals Hacking Facebook Accounts for Stealing Identity
SPAMfighter News
Once again there are reports of Facebook accounts being hacked by scammers, who are using them to demand money from friends. Quoting the news published by

Source: hacking – Google News

Filed under Blog by

Palm NOT Re-hacking iTunes Sync, but ARE Alienating Developers? – the iPhone Blog (blog)


the iPhone Blog (blog)
Palm NOT Re-hacking iTunes Sync, but ARE Alienating Developers?
the iPhone Blog (blog)
According to PreCentral.net, the upcoming Palm webOS 1.2 update will NOT be re-hacking iTunes 9 sync. In other words, the cat and mouse game between Apple

Source: hacking – Google News

Filed under Blog by

Hacking Gets Physical – InformationWeek

Hacking Gets Physical
InformationWeek
(Read: Hacking Oil Rigs). And, earlier this year, a number of stories surfaced that highlighted the security dangers surrounding smart meters and the smart

Source: hacking – Google News

Filed under Blog by

28 September, 2009

Macs enter crosshairs of Russian hacking group – MacNN

Macs enter crosshairs of Russian hacking group
MacNN
Macs are being deliberately targeted by a Russian hacking group, says Sophos security researcher Dmitry Samosseiko. The group is a subset of a larger

and more »

Source: hacking – Google News

Filed under Blog by

UNC Sends Letters To Women Affected By Hacking Incident – MyNC.com

UNC Sends Letters To Women Affected By Hacking Incident
MyNC.com
By NBC17, NBC17, 1 hour, 18 minutes ago University of North Carolina officials will be sending letters to more than 200000 women after a hacking incident.

and more »

Source: hacking – Google News

Filed under Blog by

26 September, 2009

Good hackers meet to seek ways to stop the bad hackers – MiamiHerald.com

Good hackers meet to seek ways to stop the bad hackers
MiamiHerald.com
That's an early technology that's potentially susceptible to hacking,'' Laykin said. “Now if I can hack a computer, why can't I hack somebody's

Source: hacking – Google News

Filed under Blog by

Good hackers seeking ways to stop bad hackers – MiamiHerald.com

Good hackers seeking ways to stop bad hackers
MiamiHerald.com
That's an early technology that's potentially susceptible to hacking,'' Laykin said. “Now if I can hack a computer, why can't I hack somebody's

and more »

Source: hacking – Google News

Filed under Blog by

25 September, 2009

BeEF: XSS Vuln To Hack In Less Than 20 Characters – Dark Reading

BeEF: XSS Vuln To Hack In Less Than 20 Characters
Dark Reading
another successful web application penetration test, I'm kicking myself for not noticing a new release of one of my all time favorite web hacking tools.

Source: hacking – Google News

Filed under Blog by

Thousands of largest Internet portals are vulnerable to hacking – Ecommerce Journal

Thousands of largest Internet portals are vulnerable to hacking
Ecommerce Journal
It is hard to imagine what else could be breached today as all the systems that could be hacked have been already hacked. But this turned to be not quite

Source: hacking – Google News

Filed under Blog by

SIM card hack suspect released on bail – Register

SIM card hack suspect released on bail
Register
Phillpott Martin, 26, of St Andrew, Jamaica, faces three counts of theft and one count of conspiracy to defraud over an alleged phone hacking scam.

Source: hacking – Google News

Filed under Blog by

Hacking and power: Social and technological determinism in the … – Information Warfare Monitor

Hacking and power: Social and technological determinism in the
Information Warfare Monitor
By gwalton Published: September 25, 2009 Tags: Cyberwar This article outlines the nature of hacking and then draws implications from this for understandings

Source: hacking – Google News

Filed under Blog by