Hot on HuffPost Tech:

See More Stories
Engadget for the iPhone: download the app now
AOL Tech

Tag: HACKING

Security firm RSA attacked using Excel-Flash one-two sucker punch

It has emerged that the underlying cause of RSA's SecurID gaffe was the recently-reported zero-day vulnerability found in Adobe's Flash Player. The exploit, which used specially-crafted Flash embedding in Excel spreadsheets, was first reported on March 15 and has since been fixed. RSA was hacked sometime in the first half of March when an employee was successfully spear phished and opened an...

Install any OS on a Google CR-48 laptop with Luigi

Our pal Hexxeh is at it again, only this time it's not Google's Chromium OS that he's hacking -- it's the Google Chrome OS Cr-48 laptop. We've previously shared posts about installing Ubuntu, Windows 7, and OS X on the CR-48, but the process has been a little on the complex side until now. Hexxeh's new tool -- Luigi -- simplifies the process greatly. As long as you can follow his 12-step...

Google CR-48 netbook hacked to run Windows 7 and Mac OS X Snow Leopard

We already shared Google's instructions for installing Ubuntu on a CR-48 Chrome OS netbook with you, but one enthusiast has decided to take things a step further. After all, if you can get two x86 operating systems running on the CR-48 why not try for three or four? YouTube user Damis648 has managed to get both Windows 7 and OS X Snow Leopard running on Google's plain black machine. It's a...

Gawker Media hacked, 1.5 million usernames stolen, CMS breached

Gawker Media, the company behind Lifehacker, Gizmodo, and several other major blogs, has been hacked. This has been an ongoing story for a couple of days now. At first it seemed only the user database had been compromised, but as further details emerged, it became evident Gawker's content management system had also been breached. A group going by the name 'Gnosis' appears to be taking credit for...

Firesheep comes to webOS

It's not as fast or pretty as its desktop cousin, but an ambitious tinkerer has still managed to port Firesheep to webOS. Yes, all the Wi-Fi tomfoolery that made you shudder as a Firefox extension can run on your Palm Pre.The man who performed the shoehorning -- who happens to be called Sebastian but probably isn't our Sebastian-- has shared a YouTube video of his handiwork which you can check...

Fight Firesheep with FireShepherd

Earlier this week, a login-cookie-snooping Firefox plug-in called Firesheep rocked the Internet by letting anyone compromise your Facebook or Twitter account over a wireless network. Alarmed at Firesheep's 200,000 downloads, an Icelandic engineering student named Gunnar Sigurdsson created FireShepherd, a program that crashes Firesheep with floods of nonsense packets. Although Firesheep was...

Idiocy auto-hacks Twitter accounts on public Wi-Fi, warns the owners about Firesheep

The geek community has been buzzing about Firesheep, a Firefox add-on that grabs Facebook and Twitter login cookies from any public Wi-Fi network, and uses them to log into others' accounts. Not everyone at the local coffee shop will have heard about Firesheep, though ... and that's where Idiocy comes in. Idiocy is a bit of code you can run that will use Firesheep to automatically break into any...

Google adds Gmail's 'suspicious activity' monitoring to your Google Dashboard

Back in March, Google added a very neat feature to Gmail that warns you of suspicious activity on your account. In essence (and I'm sure there's more to it than this), it simply checks the 'geolocation' of your IP address against any other logins on your account. If I log in from 'near London', and 30 minutes later someone logs in from 'near New York', an alert is produced. Today the same...

U.S. Army leak may have also compromised the investigation into China's attacks on Google

Over the last few days, news has emerged that a U.S. Army intelligence analyst, Bradley Manning, was the source that recently leaked classified information to Wikileaks. But he didn't just leak 260,000 classified cables and a brutal video of an Apache helicopter mowing down civilians and journalists in Iraq -- no, he also leaked the code name and details of the government investigation into the...

Google-wide authentication code stolen in Chinese attacks

It seems, if unnamed sources are to be believed, that the target of the cyberattack on Google back in January was none other than the unified Single Sign-On -- the system that controls access to almost every Google Web service, including Enterprise offerings and Gmail. Believe it or not, hackers managed to access the source code for the login system, potentially exposing any and all security...

Infamous hacker applauds the security of Microsoft software; less than pleased with Apple and Adobe offerings

Marc Maiffret, despite having a name that sounds uncomfortably French in origin, is one of the founding members of a special and elite club: he's a turncoat hacker. Once an infamous black hat, he's now the chief security architect for leading malware protection system developer FireEye. His list of notable accomplishments is many, but they will all be shadowed by his latest statement: Microsoft...

Pwn2Own: fully-patched iPhone hacked, SMSes downloaded via website

Vincenzo Iozzo and Ralf Philipp Weinmann, a couple of European security researchers, just demonstrated a zero-day hack on a fully-patched iPhone as part of Pwn2Own. Once an iPhone user is lured to a malicious web page, their entire SMS database is uploaded onto the server without them realizing it -- including deleted SMSes. Currently the hack crashes Safari, but they claim that given enough...

Chromium nighly build adds support for custom user stylesheets -- like shutup.css

I don't usually get into manual hacking on my web browsers -- like Firefox's about:config and userchrome.css or Opera's opera:config.That's why I initially wasn't all that interested in a change which landed in the Chromium nightly builds: custom user stylesheets. Not until I decided to give it a go and dump in shutup.css -- the stylesheet Jason wrote about previously which mutes comments on...

Using Hotmail as a secondary address? Be very careful

If you're like me, you have at least two email addresses. One of these email addresses is for important business; you hand it out to co-workers, friends, and family, whose emails you actually want to pay regular attention to. The second email address is for other stuff, like signing up for newsletters, shopping online, or creating accounts for services on the web. Also, if you're like me, you...

Students encouraged to put their hacker skills to good use

Three major federal organizations are looking to include 10,000 high school and college students in what's being dubbed by the Center for Strategic and International Studies the "US Cyber Challenge." CSIS is making three challenges available to young Americans looking to both better themselves in the field of cyber-security and potentially earn themselves a position as a security specialist in...