hackers

  • Hack The Planet! (Before It’s Too Late)

    Hack The Planet! (Before It’s Too Late)

    Greetings from the gaudy hellscape of Las Vegas, and that overcrowded maelstrom of surly hackers known as DEF CON! What follows is a brief rundown of the talks here (and its big corporate sister Black Hat) that seemed particularly interesting. Short version: software is eating the world; software can be hacked; ergo, the world can be hacked. Be afraid. Read More

  • Chrysler’s Solution To The Jeep Hack Is 1.4 Million USB Drives

    Chrysler’s Solution To The Jeep Hack Is 1.4 Million USB Drives

    You’ve probably read the WIRED story “Hackers Remotely Kill a Jeep on the Highway—With Me in It” by now. Either way, it was scary as hell. Today, the company behind Jeep has finally taken action and announced that it’s “recalling” 1.4 million vehicles because of what happened with WIRED’s Andy Greenberg. It’s not your typical recall… Read More

  • Notes From Crazytown, Day Three: Black Hat Breakdown Crunch Network

    Notes From Crazytown, Day Three: Black Hat Breakdown

    So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societies, and my sense of the ridiculous. You should mistrust all those too! Sorry. What follows is a summary of the most eyebrow-raising talks I attended or heard about: Read More

  • SourceClear Raises $1.5M Seed Round For Its Software Security Platform

    SourceClear Raises $1.5M Seed Round For Its Software Security Platform

    Modern development frameworks and libraries can make writing software quite a bit easier, but at the same time, hackers are also aware of this and they specifically target popular frameworks to find potential exploits. Unless you constantly track alerts and update your frameworks religiously, there is a good chance you end up vulnerable sooner or later. SourceClear believes that the best… Read More

  • Weev Needs To Walk

    Weev Needs To Walk

    Andrew “Weev” Auernheimer is a troll, but he’s not a criminal. This is clear. In his recent appearance in federal appellate court in Philadelphia, the ignorance surrounding his actions and the lack of proof that they are a felony, even according to the wide-open standards of the Computer Fraud and Abuse Act, makes it clear that the defendant should walk. Read More

  • Mt. Gox Source Code Leaked By Hackers Along With Team Information, Customer Data

    Mt. Gox Source Code Leaked By Hackers Along With Team Information, Customer Data

    Those interested in building a Bitcoin exchange should look no further than this chunk of source code posted by a “Russian leaker” called nanashi_. It alleges to contain the 1,700-line source code for Mt. Gox’s electronic exchange. The code describes the Bitcoin class for Mt. Gox and the various methods for transmitting and receiving BTC. Hacker News believes that CEO… Read More

  • Hardware Needs To Be Harder To Hack

    Hardware Needs To Be Harder To Hack

    News that Linksys and Belkin hardware was inherently insecure and could easily allow hackers to access your local network and control your gear. Read More

  • Handcuffs For Hacker Schools? Why A “Code Of Conduct” For Coding Bootcamps Could Actually Be Good For The Ecosystem

    Handcuffs For Hacker Schools? Why A “Code Of Conduct” For Coding Bootcamps Could Actually Be Good For The Ecosystem

    The explosion in both online and offline programming platforms over the last year has made one thing clear: Learning to code is hot. (With two “t’s.”) Well, that and the fact that our traditional education system doesn’t seem to be pulling its weight as far as computer science education is concerned. (See here.) Literally, hundreds of hacker academies and “learn… Read More

  • Four Indicted For Installing Undetectable Card Skimmers Inside Gas Pumps

    Four Indicted For Installing Undetectable Card Skimmers Inside Gas Pumps

    The New York County District Attorney announced that the NYPD arrested four men on March 21, 2013 suspected of using concealed card skimming systems to grab card numbers and PINs from hundreds of victims at gas stations in Texas, Tennessee, and Georgia. The thieves targeted RaceTrac and RaceWay pumps with their tools and nabbed $2.1 million from stolen credit and debit cards. Read More

  • Snapchat Makes You “Find The Ghosts” To Keep Hackers From Stealing Your Phone Number [Update: But It Fails]

    Snapchat Makes You “Find The Ghosts” To Keep Hackers From Stealing Your Phone Number [Update: But It Fails]

    Snapchat now verifies new users aren’t robots by making them choose its ghost mascot in images. It’s an attempt to keep out hackers who could steal phone numbers by exploiting a leaked database of details on 4.6 million accounts. A 16-year-old hacker proved he could do just that by finding the number of Snapchat CTO Bobby Murphy, but now he says Snapchat has patched the holes… Read More

  • The War On Hackers Crunch Network

    The War On Hackers

    Corey Thuen was a developer at the Idaho National Laboratory who helped to develop a network-visualization tool called Sophia. Then Battelle Energy, the company that manages the INL, rejected the notion of open-sourcing Sophia, and instead licensed it for commercial use to a company called NexDefense. So Thuen went created a separate-but-similar open-source tool called Visdom, written in… Read More

  • A Way To Save BlackBerry

    A Way To Save BlackBerry

    The first smartphone I owned was a Nokia communicator, which I chose because the C++ dev kit gave me the most freedom. When the iPhone appeared I did not switch, because mandatory App Store signing to execute code seemed like a major step in the war on general computation. Eventually I rid myself of Nokia and got an Android acting upon a moral imperative. Many hackers adhere to the ideology… Read More

  • Deep Web Users Are Ready To Launch Silk Road 2.0

    Deep Web Users Are Ready To Launch Silk Road 2.0

    In an interesting post-mortem release by the creators of the defunct anonymous marketplace Atlantis there is information that the former admins and users of the Silk Road are planning to resurrect the service. User RR writes: “We have SilkRoad v2.0 ready to launch and is now in its final testing stages. Our site has all the features of the original one and we have kept the same style… Read More

  • State Machinery For State Machines Crunch Network

    State Machinery For State Machines

    My name is Andrew Auernheimer. I used to believe problems could be solved with criticism and discourse in our marketplace of ideas. Three years ago I incremented an integer on a public web API and analyzed the output for all to read. It was then demanded I apologize for abusive arithmetic. I disagreed that addition could be abhorrent, so now I write this from the Special Housing Unit of a… Read More

  • Hacker Andrew Auernheimer Placed In Solitary Confinement For Tweeting From Prison

    Hacker Andrew Auernheimer Placed In Solitary Confinement For Tweeting From Prison

    Andrew “Weev” Auernheimer has been placed in “administrative segregation,” prison shorthand for solitary confinement for “investigative purposes.” Supporters believe he was locked down and given no Internet access because of his ability to send Tweets to a third party who relayed them on his private account. Auernheimer has not sent electronic messages… Read More

  • SecPoint Will Allow You To Access The Secretive Silk Road Black Market From Any Browser

    SecPoint Will Allow You To Access The Secretive Silk Road Black Market From Any Browser

    Needs some pharmacologicals? Dirty deeds done dirt cheap? There’s an app (or website) for that. For years, the Silk Road has been a source for black market dealings. Hidden on the Tor network, Silk Road is technically unreachable from the “normal” Internet without special secure software. Now, however, a few hackers who are attempting to remain nameless are working on a… Read More

  • Security Expert Brian Krebs Faced A Real-Life SWATing After Posting About Russian Cybercrime Site

    Security Expert Brian Krebs Faced A Real-Life SWATing After Posting About Russian Cybercrime Site

    Security writer Brian Krebs’ phone was spoofed and a SWAT team called to his home last week by hackers who apparently took offense at his investigations into various online hacking organizations. His website also suffered a denial of service attack for a short period. Read More

  • GitHub Hit With A DDoS Attack, Second In Two Days, And “Major Service Outage” [Update: GitHub Back Up, No Data Breached]

    GitHub Hit With A DDoS Attack, Second In Two Days, And “Major Service Outage” [Update: GitHub Back Up, No Data Breached]

    Services on code-sharing site GitHub have been disrupted for over an hour in what started as a “major service outage” because of a “brief DDoS attack.” This is the second DDoS attack in as many days and at least the third in the last several months: Yesterday, GitHub also reported a DDoS incident. And in October 2012, the service also went down due to malicious hackers. Read More

  • Speaking Of... Weev Wins an Honorary Crunchie Award

    You May Take Away My Freedom, But I’ll Always Have My Crunchie!

    On June 14th, 2010, Michael Arrington awarded a Crunchie¬†to two members of Goatse Security via a blog post for discovering, publishing and trying to fix a pretty egregious security flaw that they discovered on AT&T’s public website. Before going to jail, Andrew Auernheimer’s (aka “weev”) bucket list of what he wanted was the Crunchie that TechCrunch awarded to him. Read More

  • EU’s New Cybersecurity Directive Orders States To Set Up Emergency Response Teams, Better Risk Mgmt For Verticals

    EU’s New Cybersecurity Directive Orders States To Set Up Emergency Response Teams, Better Risk Mgmt For Verticals

    With hacking and malware on the rise, Europe is cracking down on cybersecurity: today the European Commission, working with the High Representative of the Union for Foreign Affairs and Security Policy, is launching a new cybersecurity strategy along with a proposed directive on how to implement it (both embedded below). Among other things, the directive calls for each member state of the EU to… Read More

  1. 1
  2. 2
  3. ...