An old Linux Trojan has been rewritten for Apple Mac OS X, extending the reach of hackers operating botnets
Showing results 1 to 20 of 37
Security researcher report hackers have gone out of their way to port an old Linux backdoor Trojan to the Apple Mac OS X platform.
Security researchers at ESET and Sophos have discovered that hackers have gone out of their way to port an old Linux backdoor trojan to the Mac OS X platform, extending their reach of computers that they can use as part of their botnets.
LinuxFoundation.org, Linux.com, and their subdomains are down for maintenance due to a security breach that was discovered on September 8, 2011.
Hackers have compromised a private e-mail list used by Linux and BSD distributors to share information on embargoed security vulnerabilities and used a backdoor to sniff e-mail traffic
The company has issued a patch that addresses 32 vulnerabilities in its Flash Player in Windows, Mac, Solaris and Linux, after hackers exploited one of the vulnerabilities
A new front has opened in the ongoing arms race between Apple and iPhone hackers, with one hacker group making the iPhone boot with a Linux 2.6 kernel.
Of course, after Apple develops an elegant and perfectly understandable mobile UI, Linux hackers want to tear it down. Bring on the OpenMoko, Android or Ubuntu Mobile for the iPhone.
A remote buffer overflow vulnerability in the Linux Kernel could be exploited by attackers to execute code or cripple affected systems, according to a Gentoo bug report that just became public.The flaw could allow malicious hackers to launch arbitrary code with kernel-level privileges.
Ubuntu today became the latest Linux vendor to patch a vulnerability in the open source operating system's kernel that could have left the door open for hackers to find their way into users' machines.
Already burned by the discovery of serious security vulnerabilities in its SDK, the Android Security Team emerged from the shadows this week with an appeal to the security community for help fixing flaws in the Linux-based mobile platform.In a note posted to several public mailing lists, the open-source group published a detailed FAQ covering its security philosophy and process and made a direct request for hackers to use responsible disclosure (.
Malicious hackers are using booby-trapped Flash banner ads to hijack clipboards for use in rogue security software attacks.In the Web attacks, which target Mac, Windows and Linux users running Firefox, IE and Safari, hackers are seizing control of the machine's clipboard and using a hard-to-delete URL that points to a fake anti-virus program.
Check out the Neo1973 which uses an open-source operating system based on OpenMoko.
According to security expert Eugene Kaspersky, we are at the brink of seeing a significant rise in malware attacks on Mac and Linux platforms. So, are hackers ready to target a broad range of platforms or is this merely hyperbole from a security firm that wants to sell products?
Is Mac OS X more "malware resistant" than Windows and Linux or is the market share too small for hackers to bother with? Does fewer patches for Mac mean increased productivity?
Survey: Fewer than one in four Linux developers say they have been hacked and even fewer have been infected by viruses
While Linux has long enjoyed a reputation for being more secure than closed source operating systems such as Windows, its rise in popularity has also made it a far more common target for hackers, a new study suggests.An analysis of hacker attacks on online servers in January by security consultancy mi2g found that Linux servers were the most frequently violated, accounting for 13,654 successful attacks, or 80 per cent of the survey total.
An international Linux conference in Adelaide next week features a fiercely competitive hack-fest
Hackers carried out their attack on Gentoo's servers using a flaw in Rsync, a file transfer program, along with a newly discovered Linux kernel bug, investigators have revealed
Hackers have forced the Gentoo Linux project to take a server offline
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)