The Hacker News Logo
Subscribe to Newsletter

The Hacker News — Cyber Security and Hacking News Website: hacking linux

Libssh Releases Update to Patch 9 New Security Vulnerabilities

Libssh Releases Update to Patch 9 New Security Vulnerabilities

March 19, 2019Wang Wei
Libssh2, a popular open source client-side C library implementing the SSHv2 protocol, has released the latest version of its software to...
Malicious Software Packages Found On Arch Linux User Repository

Malicious Software Packages Found On Arch Linux User Repository

July 11, 2018Swati Khandelwal
Yet another incident which showcases that you should not explicitly trust user-controlled software repositories. One of the most popula...
2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw

2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw

September 28, 2017Unknown
A bug in Linux kernel that was discovered two years ago, but was not considered a security threat at that time, has now been recognised a...
Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

September 13, 2017Swati Khandelwal
Microsoft has been expressing its love for Linux for almost three years now, and this love costs Microsoft an arm and a leg. Last year,...
Beware of Windows/MacOS/Linux Virus Spreading Through Facebook Messenger

Beware of Windows/MacOS/Linux Virus Spreading Through Facebook Messenger

August 24, 2017Unknown
If you came across any Facebook message with a video link sent by anyone, even your friend — just don’t click on it. Security researche...
Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response

Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response

June 29, 2017Swati Khandelwal
A critical vulnerability has been discovered in Systemd , the popular init system and service manager for Linux operating systems, that c...
Hacker Who Used Linux Botnet to Send Millions of Spam Emails Pleads Guilty

Hacker Who Used Linux Botnet to Send Millions of Spam Emails Pleads Guilty

March 29, 2017Mohit Kumar
A Russian man accused of infecting tens of thousands of computer servers worldwide to generate millions in illicit profit has finally ent...
Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild

Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild

October 21, 2016Swati Khandelwal
A nine-year-old critical vulnerability has been discovered in virtually all versions of the Linux operating system and is actively being ...
Warning — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System

Warning — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System

February 21, 2016Swati Khandelwal
Are you also the one who downloaded Linux Mint on February 20th? You may have been Infected! Linux Mint is one of the best and popul...
PlayStation 4 Hacked to Run Linux

PlayStation 4 Hacked to Run Linux

January 02, 2016Swati Khandelwal
Hackers enjoy much playing with PlayStation and Xbox, rather than playing on them. And this time, they have done some crazy things with ...
You can Hack into a Linux Computer just by pressing 'Backspace' 28 times

You can Hack into a Linux Computer just by pressing 'Backspace' 28 times

December 17, 2015Swati Khandelwal
So what would anyone need to bypass password protection on your computer? It just needs to hit the backspace key 28 times , for at l...
Kali Linux 2.0 Released — Download Most Powerful Penetration Testing Platform

Kali Linux 2.0 Released — Download Most Powerful Penetration Testing Platform

August 11, 2015Wang Wei
Offensive Security , the creators of Swiss army knife for Security researchers, Penetration testers and Hackers have finally released th...
New GPU-based Linux Rootkit and Keylogger with Excellent Stealth and Computing Power

New GPU-based Linux Rootkit and Keylogger with Excellent Stealth and Computing Power

May 09, 2015Swati Khandelwal
The world of hacking has become more organized and reliable over recent years and so the techniques of hackers. Nowadays, attackers ...
How to Run Linux Kernel on Canon DSLRs Cameras

How to Run Linux Kernel on Canon DSLRs Cameras

April 07, 2015Swati Khandelwal
Last month, I Got a Canon's amazing and powerful video-capable DSLR Camera and was wondering if I could play a hack on it. Yes, Just l...
Samba Service Hit By Remote Code Execution Vulnerability

Samba Service Hit By Remote Code Execution Vulnerability

February 24, 2015Swati Khandelwal
A critical vulnerability has been fixed in Samba — Open Source standard Windows interoperability suite of programs for Linux and Unix, ...
New BlackEnergy Crimeware Enhanced to Target Linux Systems and Cisco Routers

New BlackEnergy Crimeware Enhanced to Target Linux Systems and Cisco Routers

November 05, 2014Swati Khandelwal
Security researchers at Kaspersky Lab have unearthed new capabilities in the BlackEnergy Crimeware weapon that has now ability to hack...
Operation Windigo: Linux malware campaign that infected 500,000 Computers Worldwide

Operation Windigo: Linux malware campaign that infected 500,000 Computers Worldwide

March 18, 2014Mohit Kumar
In late 2013, Security Researchers identified thousands of Linux systems around the world infected with the OpenSSH b ackdoor trojan a...
Exclusive Deals

Get Daily News Updates By Email

Join over 350,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.