Welcome to HBH! If you had an account on hellboundhacker.org you will need to reset your password using the Lost Password system before you will be able to login.

Tech News


Symantecs New Norton 360 Wins CNET Editors Choice Award

Symantec New Norton 360 Wins Prestigious CNET Editors Choice Award
SYS-CON Media, NJ
Launching Norton 360 was the culmination of years of research, development and countless hours devoted to creating the best comprehensive security solution ...

Read the full story here.

Vista Under Attack

A number of security vendors have highlighted potential flaws in the newly released Windows Vista malware protection. Testing by Webroot\'s (www.webroot.com) Threat Research team discovered that Windows Defender failed to block 84% of a testing sample that included 15 of the most common variations of current spyware and malware. Gerhard Eschelbeck of Webroot commented, \"We want to make sure that users understand the Vista OS\'s limitations, and caution them that Microsoft\'s default malware blocking application and anti-virus programs may not fully protect them.\"

Tor hack reports downplayed by developers

Ars Technica MA - 2 Mar 2007 Despite all these details, the security research done by a University of Colorado computer science team exploded across the blogosphere in the last week and ... Read the full story here.

Drive-by pharming attacks

Symantec announced a new vulnerability on Wednesday that threatens millions of computer users. Drive-by pharming attacks stem from malicious code embedded in an innocent-looking Web site, MySpace profile or e-mail. When the victim clicks on the site, the code is surreptitiously downloaded onto their computer. It then uses JavaScript to change the DNS settings of the user\'s broadband router. More info here.

Get paid to hack vista and IE7.

In its first Quarterly Vulnerability Challenge for 2007, iDefense offered $8,000 for each flaw that can be remotely exploited in Vista or Internet Explorer 7. The company will award bounties for up to six different vulnerabilities. The company will pay an additional $2,000 to $4,000 for working exploit code. The Quarterly Vulnerability Challenges target specific high-profile applications and software. Previous Quarterly Vulnerability Challenges focused on remotely exploitable flaws in instant messaging software and in the major browsers, including Apple\'s Safari, Mozilla\'s Firefox, and Opera\'s browser. Read the full article at: http://www.securityfocus.com/brief/405 Submitted by: bardonicus

iPhone

Well it\'s been rumored for months. People have made their own prototypes in Photoshop and have googled for a lifetime for more information but Apple have finally released it. iPhone combines three products — a revolutionary mobile phone, a widescreen iPod with touch controls, and a breakthrough Internet communications device with desktop-class email, web browsing, maps, and searching — into one small and lightweight handheld device. iPhone also introduces an entirely new user interface based on a large multi-touch display and pioneering new software, letting you control everything with just your fingers. So it ushers in an era of software power and sophistication never before seen in a mobile device, completely redefining what you can do on a mobile phone. Original Source Apple.com