Mozilla accidentally posts...

Mozilla has confirmed that a partial database containing usernames and password hashes belonging to users of addons.mozilla.org was mistakenly left on a public server. As Sophos security expert Chester Wisniewski notes, Mozilla stored the compromised passwords set before April 9th, 2009 as MD5 hashes, rather than plain text.  "[But] MD5 has cryptographic...

Hackers Hit Honda, Steal M...

Just the Facts:American Honda says thieves have hacked 2.2 million customers' personal data. Names, e-mail addresses and VINs are among the data, but no financial information. A second list of 2.7 million Acura owners was also stolen but included e-mail addresses only.TORRANCE, California — It sounds bad, but perhaps it's not as bad as it could...

Microsoft warns over zero-...

Microsoft warned on Wednesday of a new zero-day vulnerability in Internet Explorer. The flaw creates a means for hackers to inject malware onto vulnerable systems, providing surfers are first tricked into visiting booby-trapped websites. As such the flaw poses a severe drive-by download risk. All established version of IE ( from 6 to 8 ) are affected. It’s...

Crack Your Own Passwords f...

Passwords are the primary key to our digital lives–providing the only barrier preventing sensitive data from being compromised in most cases. IT admins should think and act like a hacker to proactively identify weak passwords, and stay one step ahead of a data breach. The recent breach at Gawker, and subsequent analysis of the exposed passwords, though,...

FBI Added Secret Backdoors...

Okay, this is potentially very big news that really needs all the exposure it can get. OpenBSD's Theo de Raadt has received an email in which it was revealed to him that ten years ago, the FBI paid several open source developers to implement hidden backdoors in OpenBSD's IPSEC stack. De Raadt decided to publish the email for all to see, so that the code in...

Half of home Wi-Fi network...

October 14, 2010 Nearly half of all home Wi-Fi networks in the UK could be hacked within five seconds, according to CPP. The life assistance company employed the services of ethical hacker Jason Hart to roam six major cities across the UK and use specially developed software to identify home networks that were at risk of 'Wi-Fi jacking'. Wi-Fi jacking see...

12-year-old finds critical...

The security researcher who found and reported this critical buffer overflow and memory corruption vulnerability in Mozilla’s Firefox browser is none other than Alex Miller, a 12-year-old boy who earned a $3,000 bounty for his discovery. [adsense_id="1"] According to the San Jose Mercury News, Miller was motivated to search for Firefox security...

Why Facebook Would Have Fa...

Some hypothesize that the main reason for the lack of Facebook’s dominance in China is due to government protectionism to help out local firms. Given Facebook’s success in the US and many western markets, I can certainly understand why they might have such a belief. However, when we look at the issues in more depth, it’s clear that the root issues...

The Hacker Manifesto

THE HACKER'S MANIFESTO OR THE CONSCIENCE OF A HACKER +++The Mentor+++ Written on January 8, 1986 published in Phrack Volume One, Issue 7, Phile 3 of 10   The following was written shortly after my arrest… Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker...