Browsing articles in "Latest News"

Russia offers to develop supercomputer with India to counter Chinese supremacy

Apr 9, 2014   //   by Crocmaster   //   Latest News  //  No Comments

Russian supercomputing company RSC group and the Russian Academy of Sciences have proposed collaboration with India to set up supercomputing facilities that will rival China’s Tianhe-2, the world’s fastest supercomputer.

“India has many skills for building supercomputers. It is very strong in software,” said Alexey Shmelev, cofounder and chief operations officer of RSC group and delegate to the Russian Academy of Sciences. “I am ready to share technology with India. I guess there would not be many players who are willing to do so.”

In a letter last month, Boris Shabanov of the Russian Academy of Sciences has invited a team from the Indian Institute of Science and the Karnataka government to explore the possibility of a supercomputing centre in Bangalore.   Read more >>

HackShark Linux 3.1 is Released!

Aug 24, 2013   //   by Crocmaster   //   Latest News  //  No Comments

hackshark-linux-3.1

The waiting is over! All new HackShark Linux 3.1 is released. HackShark Linux 3.1 comes with MATE desktop environment, based on legacy GNOME. Easy to use, lightweight. New and improved applications. Latest kernel 3.10.9 included. New tools, like Nessus, OpenVAS, WebScarab, OSSEC HIDS, Zed Attack Proxy, Scapy, W3af are added. We removed few applications, as those are no longer supported or updated by their developers. Instead, new alternative applications are included.

Today, there are lots of Linux based operating systems are available in internet. Mostly open source, various flavored, almost same applications and somewhat same behaviour. Some of them also provides live usability without installation.  Read more >>

Mark Zuckerberg’s Facebook page hacked by peeved security researcher

Aug 21, 2013   //   by Crocmaster   //   Latest News  //  1 Comment

Mark ZuckerbergNormally you can only post on someone else’s Facebook wall if you are “friends”. That’s the way that Facebook designed it.

But Palestinian researcher Khalil Shreateh found a security vulnerability on the social network that meant he could post messages and photographs to *any* of Facebook’s 1,000,000,000+ users’ walls – something which in the wrong hands could be a very effective way of spreading malware, scams or spammy links.

But when Shreateh felt Facebook’s Security team weren’t taking him seriously, he “escalated” the problem in the most dramatic way possible. He posted a message on Facebook CEO Mark Zuckerberg’s own page.  Read more >>

Welcome to the “Internet of Things”, where even lights aren’t hacker safe

Aug 17, 2013   //   by Crocmaster   //   Latest News  //  No Comments

Malware attacks on Internet-connected Philips Hue lights cause blackouts.

Weaknesses in a popular brand of light system controlled by computers and smartphones can be exploited by attackers to cause blackouts that are remedied only by removing the wireless device that receives the commands, a security researcher said.

The vulnerabilities in the Hue LED lighting system made by Philips are another example of the risks posed by connecting thermostats, door locks, and other everyday devices to the Internet so they can be controlled by someone in the next room or across town. While the so-called Internet of Things phenomenon brings convenience and new capabilities to gadgets, they come at a cost. Namely, they’re susceptible to the same kinds of hack attacks that have plagued computer users for decades. The ability to load a Web page that causes house or office lights to go black could pose risks that go well beyond the typical computer threat.  Read more >>

Hackers Take Over Las Vegas

Aug 9, 2013   //   by Crocmaster   //   Latest News  //  1 Comment

Hacker Conferense NSA.jpg

Facing down hecklers and eggs, NSA head and four-star General Keith Alexander was not made welcome.

Alexander, also at the helm of the U.S. military’s Cyber Command, gave a presentation Wednesday at the Black Hat corporate security conference in Las Vegas, after a series of revelations about an extensive NSA spying program left many angered.

Outreach to the hacking community is paramount to national security; his efforts last year at the DEF CON show were less frosty.

Wearing dressed-down jeans and a T-shirt, Alexander spoke in 2012 at DEF CON, which runs immediately after the buttoned-down Black Hat conference. At DEF CON, which runs Aug. 1 – 4 in Las Vegas, the fun side of security, hackers and cryptographers hang out alongside criminals and law-enforcement agents alike.  Read more >>

Pages:1234567...17»

Archives





Protected by Copyscape Online Copyright Protection

Latest Visitor Record

DO NOT try to do anything wrong with our website so that we may have to report to the Feds!