Researchers have uncovered a database where over two million stolen login credentials are being stored. Facebook, Twitter, Google and Yahoo accounts are in the mix.
Showing results 1 to 15 of 15
Hacker group leaked company passwords and database, calling for the withdrawal of section 66A of country's IT Act, which limits citizens' freedom of speech and expression.
Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update.The flaw in the Transport Network Substrate (TNS) Listener database component, which Oracle has known about for at least four years, could allow a hacker to break into a database without a username or password, Oracle said in a security advisory on Monday.
Ever since a hacker was arrested for stealing 10,000 database records from the British Pregnancy Advisory Service (BPAS), the abortion clinic is now seeing thousands of copycat hacking attempts.
update Hacker group Team Intra breaches local institution's database and publishes information such as staff username and hashed passwords. NUS confirms attack but says data on server not confidential.
A grey hat hacker known as idahc, has managed to compromise Sony Europe's Database of Application Store.
a hacker group going by the name of Gnosis compromised the Gawker Media network (made up of popular websites such as Lifehacker, Gizmodo, Jezebel, io9, Jalopnik, Kotaku, Deadspin, Fleshbot, and Gawker itself) and liberated not only the source code for the site, but also the entire user database consisting of about 1.3 million usernames, email addresses, and password hashes. In an ideal world, this wouldn't be a problem, but we don't live in an ideal world, but this is far from an ideal world, so it has the scope to be a pretty big deal.
Database security vendor Sentrigo has released an open-source fuzz testing tool to help pinpoint security-related coding deficiencies in Oracle databases.The tool, called FuzzOr, runs on Oracle 8i and is aimed at PL/SQL programmers and DBAs looking to find and eliminate vulnerabilities that may be exploited via SQL injection and buffer overflow attacks -- the most common techniques used to launch hacker attacks on databases.
Notable headlines:Ryan Naraine: Hacker finds 492,000 unprotected Oracle, SQL database servers. Apple monster update fixes 41 Mac OS X, Safari vulnerabilitiesDan Farber: Michael Dell promises 'Greenprint' reference architectureLarry Ellison: First Fusion apps to arrive early in 2008Ed Burnette: D-Wave demonstrates latest quantum computer prototype at SC07.
A survey by renowned database hacker David Litchfield has found a whopping 492,000 Microsoft SQL and Oracle database servers directly accessible to the Internet without firewall protection.
The corporate Web site is gone and a hacker has made off with the database. The company's reputation is at stake. What crisis management tactics should be employed?
Your website is gone and a hacker has made off with you database. The clock is ticking and all eyes are on your next move...
The New York Times Co. on Wednesday confirmed that the internal network of its flagship newspaper was hit by a security breach. The breach that hit The New York Times was first reported by SecurityFocus Online, a site that contains content about security issues. An article there said a hacker gained access to data ranging from employee names and social security numbers to delivery records. The report also said the hacker was able to tap into a database of sources and see the Social Security numbers and home phone numbers for luminaries including former U.N. weapons inspector Richard Butler and actor Robert Redford. New York Times Co. spokeswoman Christine Mohan said the newspaper had addressed the security flaws, though it is still trying to determine what information was accessed and when the intrusion took place. --Margaret Kane, Special to ZDNet News
Hacker group 2600 has been subjected to a domain name hijacking. Due to a database error at domain registrar Network Solutions (NSI), a company called NB Productions was recently able to register 2600.com illegally.
Should the Government establish a central database that uses biometric identifiers such as DNA to make sure you're who you say you are? Hacker Kevin Mitnick thinks so.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)