Free Republic 2nd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $68,957
85%  
Woo hoo!! And we're now over 85%!! Thank you all very much!! God bless.

Keyword: hacker

Brevity: Headers | « Text »
  • Chinese military 'hacked into Pentagon'

    09/05/2007 2:40:07 PM PDT · by mojito · 17 replies · 571+ views
    Telegraph UK ^ | 9/5/2007 | Stephen Adams
    The Chinese military shut down the Pentagon's computer network for more than a week during an unprecedented cyber attack, according to leaked reports of an internal investigation. China has flatly denied the allegation, dismissing it as a product of "Cold War" thinking. However, American officials claim the People's Liberation Army (PLA) has been implicated. One US official told the Financial Times that an internal investigation had revealed the exact provenance of the attack in June this year, believed to be the most successful cyber attack ever carried out on the Pentagon. The newspaper cited another source as saying there was...
  • China Denies Hacking Pentagon Computers

    09/04/2007 6:16:17 PM PDT · by JACKRUSSELL · 11 replies · 296+ views
    Associated Press ^ | September 4, 2007 | By Anita Chang
    BEIJING (AP) — China on Tuesday denied a report that its military had hacked into Pentagon computers, saying the allegations were "groundless" and that Beijing was opposed to cybercrime. The Financial Times, citing unnamed officials, reported Monday that the People's Liberation Army hacked into a computer system in the office of Defense Secretary Robert Gates in June. The attack forced officials to take down the network for more than a week, the report said. "Some people make groundless accusations against China" that its military attacked the Pentagon, Chinese Foreign Ministry spokeswoman Jiang Yu said at a regular news briefing. "China...
  • Defense Department Responds to Cyber Threats, Official Says

    09/04/2007 4:46:28 PM PDT · by SandRat · 1 replies · 131+ views
    American Forces Press Service ^ | Sgt. Sara Wood, USA
    WASHINGTON, Sept. 4, 2007 – The Defense Department receives many attempted cyber attacks each day and has measures in place to aggressively respond to and deter these attacks, a department spokesman said today. Pentagon spokesman Bryan Whitman addressed media reports that a computer system in the Office of the Secretary of Defense was hacked into by the Chinese military earlier this year. Whitman confirmed that an attack did occur in June but declined to identify the origin of the threat. It is often difficult to pinpoint the true origin of an intrusion into computer systems and even more difficult to...
  • Chinese military hacked into Pentagon (in last June)

    09/03/2007 7:51:03 PM PDT · by TigerLikesRooster · 5 replies · 544+ views
    FT ^ | 09/03/07 | Demetri Sevastopulo and Richard McGregor
    Chinese military hacked into Pentagon By Demetri Sevastopulo in Washington and Richard McGregor in Beijing Published: September 3 2007 19:00 | Last updated: September 3 2007 20:53 The Chinese military hacked into a Pentagon computer network in June in the most successful cyber attack on the US defence department, say American ­officials. The Pentagon acknowledged shutting down part of a computer system serving the office of Robert Gates, defence secretary, but declined to say who it believed was behind the attack. Current and former officials have told the Financial Times an internal investigation has revealed that the incursion came from...
  • Chinese military hacked into Pentagon

    09/03/2007 1:21:27 PM PDT · by RDTF · 73 replies · 2,547+ views
    Financial Times via Drudge Report ^ | Sept 3, 2007 | Demetri Sevastopulo, Richard McGregor
    The Chinese military hacked into a Pentagon computer network in June in the most successful cyber attack on the US defence department, say American ­officials. The Pentagon acknowledged shutting down part of a computer system serving the office of Robert Gates, defence secretary, but declined to say who it believed was behind the attack. Current and former officials have told the Financial Times an internal investigation has revealed that the incursion came from the People’s Liberation Army. One senior US official said the Pentagon had pinpointed the exact origins of the attack. Another person familiar with the event said there...
  • Misogyny bares its teeth on the internet (Feminist blogs being hacked) ...

    08/21/2007 12:10:27 PM PDT · by SnakeDoctor · 39 replies · 1,399+ views
    Brisbane Times ^ | August 21, 2007 | Anna Greer
    <p>Apparently the Brisbane Times and Sydney Morning Herald will not allow articles to be posted, due to copyright complaints ... so I've provided a link to the article.</p> <p>The gist of the article is that a few radical feminist blogs (such as the Womens Space and Gentle Sprit) have recently been attacked and shut down in severe denial of service attacks.</p>
  • DHS Acknowledges Own Computer Break-Ins

    06/21/2007 5:46:13 AM PDT · by BGHater · 10 replies · 300+ views
    AP ^ | 20 June 2007 | TED BRIDIS
    Homeland Security Department Acknowledges Own Computer Break-Ins, Virus Outbreaks The Homeland Security Department, the lead U.S. agency for fighting cyber threats, suffered more than 800 hacker break-ins, virus outbreaks and other computer security problems over two years, senior officials acknowledged to Congress. In one instance, hacker tools for stealing passwords and other files were found on two internal Homeland Security computer systems. The agency's headquarters sought forensic help from the department's own Security Operations Center and the U.S. Computer Emergency Readiness Team it operates with Carnegie Mellon University. In other cases, computer workstations in the Coast Guard and the Transportation...
  • Fighting the Cyberwars

    05/31/2007 11:23:58 PM PDT · by qlangley · 1 replies · 337+ views
    QuentinLangley.net ^ | 01 June 2007 | Quentin Langley
    Cyberwars - in which one side takes out the other's economy and government by sabotaging its IT infrastructure - have two differences from standard wars. The first is that cyberwars are deniable, as Vladimir Putin has demonstrated. He has attacked Estonia, our NATO ally, but denies that he has done anything of the sort. NATO does not wish to acknowledge that one of its members has been attacked, because this would impose an obligation of retaliation. The second advantage is that cyberwars are asymmetric. A group of western hackers could hit the Russian government with or without a lead being...
  • QuickTime update patches Java flaw (Mac security loophole closed!)

    05/01/2007 3:59:17 PM PDT · by Yossarian · 20 replies · 326+ views
    MacCentral ^ | 5/1/2007 | Peter Cohen
    Apple on Tuesday offered QuickTime 7.1.6, an update to its core multimedia software for Mac OS X and Windows. Among the issues adjusted in this release is a fix for an exploit in QuickTime for Java that first came to light at a security conference two weeks ago.QuickTime 7.1.6 addresses numerous bug fixes and includes support for Final Cut Studio 2, and timecode and closed captioning support in QuickTime Player. Apple recommends the update for all QuickTime 7 users. It is available for download from Apple’s Web site or from the Software Update system preference.“An implementation issue exists in QuickTime...
  • Hacker puts judge in prison{Possession of child pornography}

    02/25/2007 3:16:36 AM PST · by FLOutdoorsman · 50 replies · 1,958+ views
    The Inquirer ^ | 23 Feb 2007 | Nick Farrell
    A HACKER'S investigation of Superior Court Judge Ronald C. Kline's computer has finally resulted him being sentenced to 27 months in federal prison for possession of child pornography. Klince offered "a lifetime of apologies" and then fainted as he was sent down. During the six years of court battles, Kline lost his job as a judge and was ordered to wear a tracking anklet and placed on home< confinement while his case was decided in court. Kline will be registered as a sex offender for the rest of his life and will not be allowed to possess any computer equipment...
  • Stumbling Across Islamic Hackers

    02/18/2007 8:58:53 AM PST · by Valin · 12 replies · 1,011+ views
    Strategypage ^ | 2/16/07
    Many of us know the Internet is overrun with scams and crooks. We only have to look at the spam that slips through our spam filters to get a taste. Less known is the fact that some of these Internet crooks are doing it to support Islamic terrorism. An example of this was recently revealed at a computer security conference, as two researchers described how they had worked their way into the Internet criminal underground, to find out how it operated, and came up against a group of hackers that also maintained several Islamic radical websites, and that used some...
  • UPDATE - Leftist Moonbat Now Locked-Up in Federal Prison for Hacking into Protest Warrior Website

    01/05/2007 7:06:03 PM PST · by DogByte6RER · 51 replies · 1,923+ views
    www.bop.gov ^ | January 5, 2007 | DogByte6RER
    Jeremy Hammond from Chicago is now incarcerated in federal prison for illegally accessing the Web site of a conservative political activist group and downloading the credit-card numbers of thousands of its members. Hammond plotted to use the credit cards to make donations to humanitarian and charity groups opposed by the Protest Warrior Web site into which he hacked.
  • Leftist Moonbat Sentenced to Federal Prison for Hacking into Protest Warrior Website

    12/16/2006 5:07:34 PM PST · by DogByte6RER · 43 replies · 1,936+ views
    Chicago Tribune ^ | December 8, 2006 | Matt O'Connor
    <p>A Chicago man was sentenced to 2 years in prison Thursday for illegally accessing the Web site of a conservative political activist group and downloading the credit-card numbers of thousands of its members.</p> <p>Jeremy Hammond plotted to use the credit cards to make donations to humanitarian and charity groups opposed by the Protest Warrior Web site into which he hacked, but he changed his mind, according to court records.</p>
  • Al Qaeda cyber-terrorists target Wall St

    12/01/2006 1:09:23 AM PST · by Mrs Ivan · 5 replies · 609+ views
    The Daily Mail ^ | 1st December 2006
    Wall Street was braced for a terrorist strike on financial websites last night. Sources at the U.S. Department of Homeland Security believe Al Qaeda will try to hack into sites used for online stock trading on the New York markets. Intelligence agencies have picked up 'chatter' on intercepted phone and radio links used by Al Qaeda operatives calling for disruption to start today. Online stock trading is a multi-billion-dollar-a-day market used by investors all over the world, including those in Britain. Last night, a financial expert warned traders to be extremely cautious today. They should double check all buying and...
  • 'Nasa hackers' detained in Chile

    11/09/2006 1:58:14 AM PST · by FLOutdoorsman · 346+ views
    BBC ^ | 06 No v 2006 | BBC
    The authorities in Chile have arrested four people who the police say are members of one of the world's most successful groups of computer hackers. The men are accused of breaching more than 8,000 websites, including that of US space agency Nasa. One of the men, who has used the alias "Net Toxic", is alleged to be one of the most prolific hackers in the world. The men were detained in simultaneous raids in three cities in Chile, including the capital Santiago. The Chilean police carried out the operation in co-ordination with Interpol and intelligence services from the US, Israel...
  • Earthlink Mail Servers Down, Dem Hackers Trying to Stop Get Out Vote???

    11/06/2006 11:26:38 PM PST · by Binstence · 38 replies · 1,686+ views
    Vanity | 11/6/06 | LiveFreepOrDIe
    EARTHLINK E-MAIL servers down. Could it be a conspiracy to slow republican trend??? Just a thought. Any thoughts or info on it?
  • HACKER UNLOCKS APPLE MUSIC DOWNLOAD PROTECTION

    10/24/2006 7:48:58 PM PDT · by MeneMeneTekelUpharsin · 80 replies · 2,093+ views
    Reuters via Yahoo ^ | 24 October 2006
    SAN FRANCISCO, Oct 24 (Reuters) - A hacker who as a teen cracked the encryption on DVDs has found a way to unlock the code that prevents iPod users from playing songs from download music stores other than Apple Computer Inc.'s (AAPL.O: Quote, Profile, Research) iTunes, his company said on Tuesday. Jon Lech Johansen, a 22-year-old Norway native who lives in San Francisco, cracked Apple's FairPlay copy-protection technology, said Monique Farantzos, managing director at DoubleTwist, the company that plans to license the code to businesses. "What he did was basically reverse-engineer FairPlay," she said. "This allows other companies to offer...
  • Klobuchar aide loses her job for viewing leaked Kennedy ad

    09/20/2006 7:08:35 PM PDT · by MplsSteve · 17 replies · 934+ views
    A high-level staffer on Amy Klobuchar’s U.S. Senate campaign lost her job and the DFLer’s race against Republican Mark Kennedy has veered into intrigue and controversy over the leak of an unreleased Kennedy TV ad. In a prepared statement, Klobuchar campaign manager Ben Goldfarb said that communications director Tara McGuinness last Saturday was contacted by a local blogger who sent her a link to the Kennedy ad.
  • "Path to 9/11" Web Address Hijacked

    09/08/2006 3:12:28 PM PDT · by finnman69 · 14 replies · 628+ views
    lgf ^ | 9/8/06
    "Path to 9/11" Web Address Hijacked Get a load of this one. The left is using every dirty trick and sneaky internet ploy in the book to shut down ABC’s The Path to 9/11, and here’s the latest. Someone anonymously registered the domain name pathto911.com and installed a redirect that takes visitors looking for information on the movie to the Democratic Party’s anti-ABC page. (Hat tip: Robin.) Here’s the genuine web site: ABC.com: The Path to 9/11.
  • SecureWorks admits falsifying Apple MacBook ‘60-second wireless hijacking’

    08/18/2006 5:28:21 PM PDT · by observer5 · 4 replies · 577+ views
    macdailynews.com ^ | 8/18/06 | David Chartier
    David Chartier reports for TUAW, "Remember those hackers in the Washington Post story who claimed to have hacked a MacBook's wireless drivers to gain control of it? Then remember the follow-up story where the author, Brian Krebs basically, um, how shall I say: 'slightly falsified' his way through backing up the original story with excuses that the flaw does exist in Apple's drivers, but Apple 'leaned' on them not to publicize this so they decided to use a 3rd party card?