Forget running Kali in a virtual machine (well, at least put it aside for a while). The Windows 10 Anniversary Update includes a whack new feature – Windows Subsystem for Linux or WSL. Using the new LxssManager service, WSL lets you run a full-featured Ubuntu Linux subsystem on Windows 10.
Tag: hacking
Did a major cyberattack force the shutdown of the New York Stock Exchange on July 8, 2015?
“Where there’s smoke, there’s fire”. Words to live by in our modern-day world where media faces make up the news and world leaders speak from behind a smokescreen. Case in point – there may be more to last week’s one-in-a-million coincidence where three separate software glitches brought down the Wall Street Journal, United Airlines flight…
Are Wild Neutron’s latest attacks related to the zero-day exploit(s) in Hacking Team’s drop?
Both Kaspersky and Symantec released reports this week pointing out the increase in attacks by Wild Neutron (aka Jripbot, Morpho, or Butterfly). WN had gone mostly dormant (or undetected?) since 2013 after hitting Apple, Facebook, Twitter, and Microsoft using zero-day Java exploits (seeded in the hacked forums of various websites) and the OSX/Pintsized Mac OS…
JPMorgan Chase security breach not what you think – military attack against key financial institutions could turn over keys to the kingdom.
Although I’m disappointed that JPMorgan Chase delayed the disclosure of the breach that touched more than 83 million U.S. households (they knew about it at least four months ago), I’m even more upset at what they disclosed – that key customer financial data was not stolen. JPMorgan may tout the expertise of their security team…
Obama: NSA must divulge unknown bugs like Heartbleed – unless the bug works to their advantage
In January 2014, in the midst of the NSA scandal, President Obama decided that the NSA must divulge any undisclosed flaws in Internet security that they were aware of. This means if the NSA is aware of software stack bugs like the recently discovered Heartbleed bug, they must publicly acknowledge the bug. But detractors have…
The unsolved Max Headroom Incident – pirates hijack Chicago TV broadcast to air bizarre (creepy) tirade (1987).
Before the advent of the Internet and widespread existence of a coordinated “hacking” culture, a strange and eerie incident occurred during a November 22, 1987 broadcast on WTTW-11 Chicago of Dr. Who, when a still-unidentified hacker took over the station’s broadcast replacing a brief section of the evening’s program with a creepy montage of a…
Evidence emerges suggesting hijacking of huge chunks of Internet traffic
Researchers from network intelligence firm Renesys published an assessment this week that documents dozens of distinct hijacking events within the last few months where huge chunks of Internet traffic were purposefully diverted through distant service providers leading them to speculate that the traffic may have been “surreptitiously monitored or modified before being passed along to…
Eh, dead MI6 agent found padlocked inside own gym bag probably a self-inflicted accident?
In a classic WTF moment, the ruling on the death of MI6 espionage agent Gareth Williams has been changed. Originally the secret code breaker’s death was ruled a “unnatural and likely criminally meditated act” after his lifeless body was found stuffed inside his own padlocked gym bag. Now British police say that Williams’ death was…
Illuminati obsessed hacker – mysterious “Guccifer” entertains while outing prominent politicians and media personalities
His screen name is a bit humorous – and a bit scary. Nobody knows where the Illuminati-obsessed hacker originates from (IP addresses originate from Russia but language appears to be distinctly American). And his hacking expertise is well worth noting, especially if you are a politician that has found yourself in his cross-hairs. Right now,…
Corps of Engineers confirms that sensitive National Inventory of Dams (NID) database was hacked by Chinese
The Army Corps of Engineers has admitted that an unauthorized Chinese user has hacked the National Inventory of Dams (NID) database in January 2013 and that the attack was not discovered until sometime in April. There are about 8,100 major dams in the U.S., and the NID database has information about all of them, including…








