How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Linux’
Most Recent
Read More
November 17, 2016

Microsoft Joins Linux Foundation, Bets on Open Cloud Computing

Only a few years ago the idea that Microsoft could actively promote Linux and join the Linux Foundation would have sounded like science fiction, but that’s exactly what happens now: Microsoft is joining the Linux Foundation as a Platinum member.

Read More
February 21, 2016

Linux Mint Website Hacked: Motive Unknown

Hackers breached the Linux Mint website, Linux noted in a blog posting today. The Linux Mint 17.3 Cinnamon is the only compromised edition to the best of the company’s knowledge. Users who downloaded another edition or release are not affected. Users who downloaded via a direct HTTP link or via torrents are not affected either.

Since the breach occurred today, it should not affect users who downloaded the edition on Feb. 20.

Linux Gives Corrective Action

Users who still have the ISO file are instructed to check the MD5 signature posted on the blog with the “md5sum yourfile.iso” command where “yourfile.iso” is the ISO name. The blog page lists the valid [...]

Read More
December 16, 2015

Grub2 Bypassable Without a Password

The Grub system is pretty common on Linux desktops. Grub stands for GRand Unified Bootloader, and Grub2 is a continuation of its development. For a long time, another bootloader was also used by many distributions, called LiLo, which was short for Linux Loader, and while it is still actively developed, most distributions opt for Grub anymore.

Grub2 allows the user a degree of control before full boot, selecting which operating system to use, which kernel to use, and even allows for some security there, placing a password for pre-access. On highly sensitive systems, this can be useful. Grub2 also has a number of recovery options available via a somewhat limited shell that can [...]

Read More
November 9, 2015

New Ransomware Targets Linux Powered Websites

A new strain of ransomware targeting Linux-powered websites and servers is discovered in the wild and continues the trend and threat posed by any other ransomware – encrypt a victim’s information and data in exchange for a ransom fee.

Ransomware is among the most notorious and damaging strains of malware in recent times with the most destructive of them all – CryptoWall is estimated to have raked in over $300 million for its developers this year alone. Other ransomware related to the Angler Exploit Kit have been found to net over $30 million for the authors behind the malware.

The ransom is commonly sought in Bitcoin in exchange for a decryption key that promises to [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University