Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘Linux’
Most Recent
Read More
February 21, 2016

Linux Mint Website Hacked: Motive Unknown

Hackers breached the Linux Mint website, Linux noted in a blog posting today. The Linux Mint 17.3 Cinnamon is the only compromised edition to the best of the company’s knowledge. Users who downloaded another edition or release are not affected. Users who downloaded via a direct HTTP link or via torrents are not affected either.

Since the breach occurred today, it should not affect users who downloaded the edition on Feb. 20.

Linux Gives Corrective Action

Users who still have the ISO file are instructed to check the MD5 signature posted on the blog with the “md5sum yourfile.iso” command where “yourfile.iso” is the ISO name. The blog page lists the valid [...]

Read More
December 16, 2015

Grub2 Bypassable Without a Password

The Grub system is pretty common on Linux desktops. Grub stands for GRand Unified Bootloader, and Grub2 is a continuation of its development. For a long time, another bootloader was also used by many distributions, called LiLo, which was short for Linux Loader, and while it is still actively developed, most distributions opt for Grub anymore.

Grub2 allows the user a degree of control before full boot, selecting which operating system to use, which kernel to use, and even allows for some security there, placing a password for pre-access. On highly sensitive systems, this can be useful. Grub2 also has a number of recovery options available via a somewhat limited shell that can [...]

Read More
November 9, 2015

New Ransomware Targets Linux Powered Websites

A new strain of ransomware targeting Linux-powered websites and servers is discovered in the wild and continues the trend and threat posed by any other ransomware – encrypt a victim’s information and data in exchange for a ransom fee.

Ransomware is among the most notorious and damaging strains of malware in recent times with the most destructive of them all – CryptoWall is estimated to have raked in over $300 million for its developers this year alone. Other ransomware related to the Angler Exploit Kit have been found to net over $30 million for the authors behind the malware.

The ransom is commonly sought in Bitcoin in exchange for a decryption key that promises to [...]

Read More
October 7, 2015

Malware Peddling Vigilantes behind Linux.Wifatch Speak Up


The group of black/white-hat (?) hackers who infected over 10,000 Linux routers with malware to fend off the really bad malware have come forward in speaking to Symantec, the security software company that originally revealed the mysterious malware.

Linux.Wifatch recently made plenty of headlines when security researchers at Symantec uncovered it for what it was – a white-hat malware safeguarding routers, IP cameras and other devices from typical havoc-mongering malware.

After the reveal, a group calling itself “The White Team” recently published the entire source code for Linux.Wifatch on GitLab and all signs point to them being the ‘vigilantes’ behind [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University