hacker

hacker

Hacker gang touts unlimited supply of zero-day bugs

www.pcworld.com
The Elderwood gang specializes in finding and exploiting zero-day vulnerabilities in Microsoft's IE browser and Adobe's Flash Player....
Hacker gang touts unlimited supply of zero-day bugs

'Pinkie Pie' trips up Chrome, close to $60K at Hack in the Box

www.computerworld.com
It appears the hacker known as "Pinkie Pie" produced the first Chrome vulnerability at the Hack In the Box conference on Wednesday, just ahead of the deadline for the competition this afternoon....
'Pinkie Pie' trips up Chrome, close to $60K at Hack in the Box
A 3D-printed punch card reader: the first step to a working printed computer

Shocking Study Finds Hackers Are 'Antisocial Man-Children Who Live In Their Parents' Basements'

betabeat.com
A typical hacker. (Photo: Tumblr) A new study published by the University of Montreal has yielded earth-shattering conclusions that are sure to rock the public’s fundamental understanding of computer hackers. Largely considered to be clean-shaven upstanding adults residing in beautifully-kept apartments and boasting impressively high emotional IQs, the study has revealed...
Shocking Study Finds Hackers Are 'Antisocial Man-Children Who Live In Their Parents' Basements'

IronPearl Is Systematizing The Secrets That Have Helped Startups Like Wanelo, Lyft And Goodreads Grow

techcrunch.com
If you build it, they will come, right? Not exactly. Growth is actually a lot more complicated than that. Getting users to discover your product, and then stick to it, is more of a rigorous science that uses lots of multivariate testing and traffic funnels. A pair of longtime investors...
IronPearl Is Systematizing The Secrets That Have Helped Startups Like Wanelo, Lyft And Goodreads Grow

Verizon Galaxy S III has locked bootloader (but it's been rooted anyway)

www.engadget.com
Based on Samsung's hacker-friendly track record, you'd generally expect one of it smartphones to come with an unlocked bootloader, making it easy to update or tweak with unofficial ROMs. That's not the case with Verizon's imminent version of the Galaxy S III, however. As the folk at XDA know...
Verizon Galaxy S III has locked bootloader (but it's been rooted anyway)

CAPTCHA showing flaws according to Imperva report, but let’s not give it up just yet

thenextweb.com
CAPTCHA, the Completely Automated Public Turing test to tell Computers and Humans Apart, has been used for years to try to stop automated spamming and as a line of defence when it comes to hacking into accounts. It seems that the technology behind some CAPTCHA systems is somewhat lacking though...
CAPTCHA showing flaws according to Imperva report, but let’s not give it up just yet
450,000 Yahoo passwords just got hacked; find out if you might be affected

Skype And Dropbox Fix Redirect Security Hole That Could've Hacked Your Facebook

techcrunch.com
Nir Goldschlager just saved your identity. One of the world’s top white hat security researchers, Goldschlager this week helped Skype and Dropbox fix a critical security flaw that could have let hackers take control of their users’ Facebook accounts. Tomorrow Goldschlager will detail how found the exploit, but he gave...
Skype And Dropbox Fix Redirect Security Hole That Could've Hacked Your Facebook

Hacker finds way to run desktop applications on Windows RT

www.computerworld.com
A hacker claims to have found a method of bypassing the code integrity mechanism in Windows RT, therefore allowing for desktop-style programs to be installed on the platform....
Hacker finds way to run desktop applications on Windows RT

The Inside Network Job Board: 12 Gigs, Wooga, PaeDae and more

www.insidemobileapps.com
The Inside Network Job Board is dedicated to providing you with the best social media job opportunities across social and mobile application platforms. Here are this week’s highlights from the Inside Network Job Board, including positions at: 12 Gigs, Wooga, PaeDae and more. 12 Gigs Mobile Games – Back-End Software...
The Inside Network Job Board: 12 Gigs, Wooga, PaeDae and more

Hacker successfully 'jailbreaks' Google Glass within two hours

www.electronista.com
The Google Glass headset has been rooted, shortly after it has started being issued by the search giant to developers. Jay Freeman, a hacker that goes by "Saurik" and creator of the Cydia app store for jailbroken iPhones and iPads, gained access to a level that he could theoretically prevent...
Hacker successfully 'jailbreaks' Google Glass within two hours
Google Business Photos goes to Canada, Ireland and Netherlands

Hacker publishes alleged zero-day remote code execution exploit for older Plesk versions

www.pcworld.com
A hacker released what he claims is a zero-day exploit for older versions of the Parallels Plesk Panel, a popular Web hosting administration software package, that could allow attackers to inject arbitrary PHP code and execute rogue commands on Web servers.The hacker uses the alias "Kingcope" and has published...
Hacker publishes alleged zero-day remote code execution exploit for older Plesk versions

Pirate Bay, WikiLeaks fight off crippling attacks

news.cnet.com
Tables turn as hacker favorites are targeted in DDoS attacks. [Read more]...
Pirate Bay, WikiLeaks fight off crippling attacks

Judge ignores leniency plea, hands AT&T hacker a 41-month-sentence

www.computerworld.com
A federal judge today sentenced hacker Andrew Auernheimer's to 41 months in prison for illegally accessing email addresses and other data belonging to more than 120,000 iPad subscribers from AT&T's networks....
Judge ignores leniency plea, hands AT&T hacker a 41-month-sentence

Hacker runs desktop apps on Windows RT

www.computerworld.com
A hacker claims to have found a method of bypassing the code integrity mechanism in Windows RT, therefore allowing for desktop-style programs to be installed on the platform....
Hacker runs desktop apps on Windows RT

Adobe investigates alleged customer data breach

www.pcworld.com
Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. The information was released on Tuesday on Pastebin by a self-proclaimed Egyptian hacker named "ViruS_HimA." The hacker, who claimed the database accessed holds more...
Adobe investigates alleged customer data breach

The Pakistan Cyber Army May Be Coming For Your Small Business Website

betabeat.com
Protests against the anti-Muslim “film” Innocence of Muslims have yet to metastasize into a something larger and scarier but religiously motivated hackers are waging a sustained war online. Muslims citing the offensive videos have been hacking, DDoSing and defacing hundreds of websites big and small. While DDoS (Directed Denial of...
The Pakistan Cyber Army May Be Coming For Your Small Business Website

Windows RT can be tweaked to run desktop apps, hacker says

www.pcworld.com
Running traditional desktop apps on Windows RT may be one step closer to reality, thanks to a vulnerability that a hacker claims lets you run any desktop app on the ARM version of Windows. A hacker called 'clrokr' recently detailed the Windows RT exploit, which requires manipulating a part...
Windows RT can be tweaked to run desktop apps, hacker says

AT&T hacker seeks sentencing leniency

www.computerworld.com
Andrew Auernheimer, a hacker who was convicted last November of illegally accessing emails and other data belonging to 120,000 iPad 3G owners from AT&T's networks is seeking leniency in his sentencing from the court....
AT&T hacker seeks sentencing leniency

Disruptions: A Fuzzy and Shifting Line Between Hacker and Criminal

bits.blogs.nytimes.com
To many people who understand computers and the law, there is a danger in lumping people who have not sought financial gain with armed robbers. Where people should receive slaps on the wrist, they face decades in jail....
Disruptions: A Fuzzy and Shifting Line Between Hacker and Criminal

Chromium OS gets ported to Raspberry Pi

www.engadget.com
Hexxeh has already proven his love for Chromium OS and the Raspberry Pi, obviously the next step was for the hacker to combine his passions into one project. Thus was born Chromium OS for the tiny ARM-powered computer from the UK. The initial commit of the port was officially...
Chromium OS gets ported to Raspberry Pi

The Long, Weird Road To The Facebook Phone

readwrite.com
Time and again, Mark Zuckerberg has made it perfectly clear: "We're not going to build a phone." Zuck's most recent pronouncement came at Facebook's 2012 fourth-quarter earnings call. (See also Facebook's Zuckerberg: We're Not Going To Build A Phone.)  On Thursday, just two months later, Facebook is widely expected to announce an...
The Long, Weird Road To The Facebook Phone

Instagram vulnerability on iPhone allows for account takeover

www.computerworld.com
A security researcher published on Friday another attack on Facebook's Instagram photo-sharing service that could allow a hacker to seize control of a victim's account....
Instagram vulnerability on iPhone allows for account takeover
iPhoneDevSDK Details What Led to Apple, Facebook Hacking

Networks under attack

www.guardian.co.uk
Your company's confidential information is under threat from botnets, spreading infection across the networkA botnet is a collection of connected PCs that are under the control of a remote hacker, typically through an infected PC that is then run by an external command and control system.The infected software can be...
Networks under attack
Anonymous blows off WikiLeaks, calls Assange a sellout over Lady Gaga dinner

LulzSec hacker neuron pleads guilty to Sony Pictures security breach

arstechnica.com
An Arizona man has admitted hacking a Sony Pictures website and making off with personal information for thousands of individuals as part of a campaign by the LulzSec collective. Raynaldo Rivera, who was 20 years old when he was arrested in August, made the admission in a plea agreement recently...
LulzSec hacker neuron pleads guilty to Sony Pictures security breach

The Four Critical Security Flaws that Resulted in Last Friday's Hack

blog.cloudflare.com
A core value CloudFlare is that security information should be shared between organizations to make the entire Internet safer. That is how CloudFlare's systems work: if one site is attacked, data about that attack is immediately shared with the rest of the network so other sites can be safe....
The Four Critical Security Flaws that Resulted in Last Friday's Hack
× Just a test of the new info bar. What do you think?