Process Hacker from WJ32 is a free open-source utility that displays all the processes running on your PC in a compact, customizable view. It not only shows detailed information on each process but also gives you a range of control that greatly improves upon Windows' built-in capabilities. It offers performance graphs, thread listings, stacks, and much more. You can not only terminate individual processes but entire associated trees; suspend, reduce, restart, and debug processes; view detailed information on network processes and services from a unified listing; create dump files; and call up enhanced Properties Dialogs with as many as nine … Read more
That nice, new computerized car you just bought could be hackable.
Of course, your car is probably not a high-priority target for most malicious hackers. But security experts tell CNET that car hacking is starting to move from the realm of the theoretical to reality, thanks to new wireless technologies and evermore dependence on computers to make cars safer, more energy efficient, and modern.
"Now there are computerized systems and they have control over critical components of cars like gas, brakes, etc.," said Adriel Desautels, chief technology officer and president of NetraGard, which does vulnerability assessments and penetration … Read more
Is the cloud a hacker's paradise? A survey at last month's Defcon hacking conference paints that picture.
Sponsored by security vendor Fortify Software, the survey asked 100 hackers who attended Defcon about security in the cloud. A sizable 96 percent said they believe the cloud opens up more hacking opportunities, while 89 percent said cloud vendors aren't doing enough to address cybersecurity issues.
Among the hackers surveyed, 45 percent said they had already tried to exploit vulnerabilities in the cloud. Although only 12 percent admitted to hacking into cloud systems for the money, that's still a … Read more
Several members of a hacker group responsible for exposing a hole on an AT&T Web site for iPad customers have been questioned by a federal grand jury about the incident, the group confirmed to CNET on Friday.
"No warrants or indictments yet. Two Goatse analysts, 'Sloth' and 'Rucas,' went before a grand jury on the 11th," Andrew Auernheimer, a key member of the hacker group that calls itself Goatse, wrote in an e-mail response to questions. "This makes well over a month of grand jury proceedings."
Auernheimer and another member of the group declined … Read more
It's our annual scare-the-bejesus out of ourselves episode, wherein we discuss all of the scary things that were announced and demonstrated at DefCon this year. Seriously, DefCon is way past phone phreaking and seriously into national security right now. Yikes. Also, new Apple jailbreaks are available, the BlackBerry doesn't pass Middle Eastern muster, and we've got the ultimate solution to Internet privacy concerns: data locavores.Subscribe: iTunes (MP3) | iTunes (320x180) | iTunes (640x360) | RSS (MP3) | RSS (320x180) | RSS (640x360)… Read more
Last year, a security researcher was forced to cancel his talk scheduled for two hacker conferences about weaknesses in ATM software after the ATM vendor complained.
"I've always liked the scene in "Terminator 2" where John Connor walks up to an ATM, interfaces his Atari to the card reader and retrieves cash from the machine. I think I've got that kid beat," Barnaby Jack, who works for … Read more
Security researcher and former Microsoft gadfly Marc Maiffret has returned to the company he started when he was a teenager, eEye Digital Security.
Maiffret had been serving as chief security architect at antimalware firm FireEye since December and will remain on the company's technical advisory board, Maiffret said in an interview on Monday.
"I'm coming back to eEye as chief technology officer to lead the overall technology vision and be involved in day-to-day stuff on the research front," he said.
Asked why he was returning to the company he started in 1998 when he was a … Read more
Google has plugged a hole hackers used Sunday morning to festoon YouTube videos with off-color pop-ups and adult-site redirects, according to a news outlet.
Hackers took advantage of a cross-site scripting vulnerability that enabled them to insert code onto the popular video site's viewer-comments pages, IDG News Service said in a report. The hackers apparently had it in for Justin Bieber, focusing on clips related to the teen pop star, who's set to appear Sunday night on an NBC television celebration of the Fourth of July and who's reportedly one of the most popular attractions on YouTube. … Read more
An investigation that the Federal Trade Commission launched into Twitter's allegedly lax security practices following two high-profile hacking incidents last year has been settled, the company announced Thursday.
Twitter general counsel Alexander MacGillivray, who joined the company last summer after serving as a member of Google's legal team, posted an entry on the company blog Thursday explaining the situation. "Early in 2009, when Twitter employed less than 50 people, we faced two different security incidents that impacted a small number of users," the post explained. "Put simply, we were the victim of an attack and … Read more
A hacker involved in the disclosure of a security flaw in an AT&T iPad-related Web site was released from an Arkansas jail Thursday after posting a $3,160 bond on felony drug possession charges, authorities said.
Andrew Auernheimer, 24, was arrested Tuesday after officials searching his Fayetteville, Ark., home on an FBI search warrant said they found less than a gram of cocaine, one ecstasy pill, 19 tabs of LSD, and some Oxycodone. They also allegedly found a different pharmaceutical classified as schedule 3, which makes it a misdemeanor.
FBI officials would not say whether or not the … Read more