By Johnny Daniels Contributing Writer, [GAS] While President Obama is going around thinking that his sparkling, very expensive new smart phone is secure and hacker-proof, convicted hacker Kevin Mitnick has some bad news for him – it’s not secure at all. Mitnick, who spent nearly 5 years in prison for hacking offences, told Fox News […]
Pablos Holman is a futurist, IT security expert, and notorious hacker with a unique view into both breaking and building new technologies. In the following presentation, he explains what drives computer hackers to do what they do best: break into gadgets, networks, and systems.
By hooking a $250 Motorola RFID reader and an antenna to his laptop, Chris Paget was able to easily harvest and clone multiple RFID identity documents while driving through San Francisco. Fortunately for the victims Chris is a white hat hacker and only did this to prove that using RFID-enabled identify cards can only be […]
A senior Unix administrator known only as “SK” admitted she got lucky when she found the malicious script planted in a development server on the network. The script was buried within lines of legitimate code according to an affidavit filed against Rajendrasinh Makwana, an Indian citizen living in the United States under a work visa. […]
You’d think that a Monster once bitten would be twice shy. But even though user information has been stolen from Monster.com on at least two prior occasions, it has happened yet again. This time, the data includes user IDs and passwords, as well as contact information. Monster does not store Social Security numbers, thankfully. The […]
If you are a small company that needs to process credit card payments, you probably can’t afford an expensive solution and high processing fees. Most small customers go with a tailored service that understands small business needs, and one of the best companies working with small businesses is Heartland Payment Systems. Chances are, if you […]
Can you spot anything wrong in this picture? It probably won’t be what most of you will think right away. Click to enlarge Now, if you “got it”, do you really need another reason to switch? [Via Digg]
By Miss Cellania Contributing Writer, [GAS] Wired’s Threat Level blog has an interview with GMZ, the hacker who briefly helped himself to some high-profile accounts at Twitter a few days ago. The way he got in was ridiculously simple. 1. He identified a very active account. It later turned out to belong to a Twitter […]