Keyword: hacker
-
<p>WASHINGTON — The chief suspect in what U.S. authorities are calling the largest ever successful hacking effort against American military networks is an unemployed British computer administrator who worked from his home computer.</p>
<p>Gary McKinnon, 36, of London was indicted in federal courts in Virginia and New Jersey on Tuesday on eight counts of computer-related crimes. These included break-ins over 12 months at 92 separate U.S. military and NASA networks across 14 states, including two at the Pentagon. McKinnon also was accused of hacking the networks of six private companies and organizations.</p>
-
Hackers send Sendmail a message Online vandals hacked into the primary download server for Sendmail.org and replaced key software with a Trojan horse, a Sendmail development team member said Wednesday. The apparent attack on Sendmail didn't leave a back door in the popular open-source e-mail software package, as previously believed, but compromised the download software on the Sendmail consortium's primary server so that every tenth request for source code would receive a modified copy in reply. "The exploited code that we see is not in our (development) tree at all," said Eric Allman, chief technology officer of Sendmail Inc., which...
-
“In a bit of judicial activism, Judge Coughenour took Gorshkov’s family’s 'medical and financial problems' into account and rejected the federal prosecutor’s request that Gorshkov serve at least sixteen years for his numerous crimes [including twenty counts of computer crimes, fraud and conspiracy]. Coughenour, a so-called 'maverick' judge first appointed during the Reagan Administration, has made a habit in recent years of legislating from the bench...”
-
My Black Ice 3.5 just gave me a "data changed" red alert. What should I do about this? Can anyone explain this situation and appropriate action to me in language I can understand? Here is what the Black Ice Advice Screen says: Summary An overlap in new TCP data with queued data has been observed, and the overlapping data has changed between the two packets. Details This technique is used by advanced hackers to hijack connections. They utilize IP spoofing and sequence number guessing to intercept a user's connection and inject their own data into the connection. If successful, the...
-
Privatizing the Cyberwar By Glenn Harlan Reynolds 08/14/2002 TCS It is no secret that Al Qaeda and other Islamic terror groups make extensive use of the web. Some websites provide coded messages, in the same fashion that radio stations used to broadcast coded messages for spies in enemy territory. Others play a role in recruiting, in disseminating propaganda, and in soliciting donations. Some may serve all of these functions. No doubt various official U.S. government agencies are looking at these sites, in order to gather intelligence and identify enemies. But they're not alone. In fact, one of the interesting aspects...
-
NEW YORK (Reuters) - Some of the world's best-known hackers unveiled a plan this weekend to offer free software to promote anonymous Web surfing in countries where the Internet is censored, especially China and Middle Eastern nations. An international hacker group calling itself Hactivismo released a program on Saturday called Camera/Shy that allows Internet users to conceal messages inside photos posted on the Web, bypassing most known police monitoring methods. In addition, "Mixter," an internationally known German hacker, said Hactivismo was preparing in coming weeks to launch technology, which if adopted widely could allow anyone to create grassroots, anonymous networks...
-
SAN FRANCISCO (Reuters) - Which part of the world has the dubious distinction of being the most active hotbed of computer hacking? Among the most highly wired economies, more cyber attacks originate from Israel and Hong Kong on a per-Internet-user basis than anywhere else, while Kuwait and Iran top the list of the category of countries with fewer Internet users, according to a study released on Monday. Overall, the United States generates by far the most cyber attacks, followed by Germany, South Korea, China and France, according to a report from Riptech Inc., a managed security service provider based in...
-
<p>LOS ANGELES, California (AP) -- Power and energy companies have become targets for computer hackers, who have managed to penetrate their networks and other systems.</p>
<p>The Los Angeles Times reported Monday that energy and power companies have been hit with an average 1,280 significant attacks in the last six months, far more than companies in any other industry.</p>
-
A clip from the column found at World Tech Tribune.com. Enough about the hypocrisies of the EFF and the ACLU: What is transparency and how can it empower citizens, end cyber crime/terrorism and keep the EFF from crying foul? I’ve been a big believer in citizens’ accountability for their own actions, actively self-governing themselves and form their own citizen “government oversight” committees for my whole life. The use of cheap, readily-available communication technology immensely aids both of these actions. Having portable video cameras phones allowed Chinese students to show the Communist Party’s abuses at Tiananmen Square to a horrified world...
-
Help ! ! I'm Being Probed Repeatedly by a Hacker / Cracker !Need help from an Freepers out there who have the ability to trace ISP numeric addresses. I've been on line for about 30 minutes and in that time I've had over 100 probes coming in on different ports. I have installed the free version of Zone Alarm and it signals me whenever there is a new probe with the ISP address being used by the attacker. All of the attacks have orinated from the following ISP address: 206.157.247.131 I have attempted to trace the ISP and it appears...
|
|
|