I had the pleasure of attending DerbyCon 4.0 (FamilyÂ Rootz) this past Friday and Saturday and ca ...(more)...
Johannes B. Ullrich, Ph ...(more)...
I just published an updated YouTube presentation (about 15 min in length) with some of the shell ...(more)...
Ever since the shellshockÂ vulnerability has been announced, we have seen a large number of scans ...(more)...
With everybody's eyes on bash vulnerabilities, two new problems have been found . These proble ...(more)...
By now, I hope you are well on your way to patch your Linux systems for the bash code injection v ...(more)...
If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.
We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.
Please reserve top level comments for those posting open positions.
You can see an example of acceptable posts by perusing past hiring threads.
Feedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
In the world of hacking, every malicious tool has its heyday---that period when it rules the underground forums and media headlines and is the challenger keeping computer security pros on their toes. Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well. These days, though, point-of-sale RAM scrapers are what's making the news.
The post How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks appeared first on WIRED.
With a bug as dangerous as the "shellshock" security vulnerability discovered yesterday, it takes less than 24 hours to go from proof-of-concept to pandemic.
The post Hackers Are Already Using the Shellshock Bug to Launch Botnet Attacks appeared first on WIRED.
In 1960, an IBM engineer named Forrest Parry was developing a new type of ID card for the CIA when he had an epiphany: Why not make each card a tiny data storage device in and of itself? He cut a short length of half-inch wide magnetic tape from a reel and wrapped it around […]
The post Why the Heyday of Credit Card Fraud Is Almost Over appeared first on WIRED.
A nasty bug in many of the world’s Linux and Unix operating systems could allow malicious hackers to create a computer worm that wreaks havoc on machines across the globe, security experts say. The flaw, called Shellshock, is being compared to last spring’s Heartbleed bug because it lets attackers do some nasty stuff—in this case, […]
As a young man, Kevin Mitnick became the world’s most notorious black hat hacker, breaking into the networks of companies like IBM, Nokia, Motorola, and other targets. After a stint in prison, he reinvented himself as a white hat hacker, selling his skills as a penetration tester and security consultant. With his latest business venture, […]
The post Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now Selling Zero-Day Exploits appeared first on WIRED.
The fixes Apple bolted on to iCloud’s security following its epic spill of stolen celebrity nudes may be far from perfect. But give Apple credit: It made a lot of sex-starved hackers very unhappy.
If you shared or re-published any of the images of nude celebrities that leaked online earlier this month, you could be charged with a felony under a new Arizona law.
The post Arizona Could Send You to Prison for Sharing Nude Celebrity Pictures appeared first on WIRED.
Four MIT students behind an award-winning Bitcoin mining tool will face off against New Jersey state authorities in court today when they attempt to fight back against a subpoena demanding their source code. The Electronic Frontier Foundation is representing 19-year-old MIT student Jeremy Rubin and three classmates in a remarkable case that stands out for […]
The post MIT Students Battle State’s Demand for Their Bitcoin Miner’s Source Code appeared first on WIRED.
How did Anonymous make the leap from a rather amusing anti-Scientology society to a global protest movement whose force was felt in the highest circles of power? Well, as Anonymous anthropologist Gabriela Colemen describes it in her upcoming book on the hacking collective, Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous, it was a bit of a fluke. But it happened because of PayPal and the company's financial blockade against the whistleblowing site WikiLeaks.
The post Upcoming Book Charts Anonymous’ Rise, From Silly Pranks to Serious Power appeared first on WIRED.
Silicon Valley's smartphone snitching has come to an end. Apple and Google have promised that the latest versions of their mobile operating systems make it impossible for them to unlock encrypted phones, even when compelled to do so by the government. But if the Department of Justice can't demand that its corporate friends unlock your phone, it may have another option: Politely asking that you unlock it yourself, and letting you rot in a cell until you do.
The post Google and Apple Won’t Unlock Your Phone, But a Court Can Make You Do It appeared first on WIRED.