Keyword: hacker
-
O'Reilly takes aim at those responsible for both the hack and the "slimy" sites which propagated it. If for no other reason to watch the 2nd video, it's to see Megyn Kelly again... :)
-
Is the Obama campaign’s David Plouffe connected to alleged hacker David Kernell September 18th, 2008 This website may have evidence of a connection between David Plouffe of the Obama campaign and alleged hacker of Sarah Palin’s emails David Kernell, son of Tennessee Democratic Representative Mike Kernell: There is an apparent connection between David Kernell and David Plouffe. If you do a Technorati search for “david kernell” http://www.technorati.com/search/%22david+kernell%22?authority=a4&language=en and then click on Videos about David Kernell, the first video you see if of David Plouffe (Campaign manager for Obaman). He probably did the video for Plouffe. This is not a casual...
-
The guy who hacked into would-be VP Sarah Palin’s Yahoo email account is none other than the son of a Democratic state representative from Tennessee, posits GatwayPundit. A convincing amount of evidence suggests the “hacker” (perhaps a status he doens’t deserve) is David Kernell, son of Tennessee representative Mike Kernell.
-
http://www.mikefrancesa.com/wordpress/?p=1212Mike Kernell, a longtime Tennessee state assemblyman from Memphis and a technology enthusiast, is concerned about future elections because the new machines are harder to get a look at. ”We used to be able to check the machines and see if they’d been tampered with,” he said. ”It is now almost impossible.” Mr. Kernell wonders whether he will have to hire a computer programmer in his next race to make sure the machines are working smoothly and haven’t been tampered with. ”We’ve hit a brick wall,” he said.
-
The hacker who broke into Republican vice presidential candidate Sarah Palin's Yahoo (NSDQ: YHOO) Mail account appears to have done so by requesting a password reset and answering the challenge questions with the help of Google and Wikipedia. According to a purported first-person account of the hack posted on 4chan.org, an online forum, "Rubico," the person claiming responsibility, initiated a password change on Palin's account and then supplied the Alaska governor's birthday and her home ZIP code, with the help of "Wikipedia andGoogle (NSDQ: GOOG) to find the info." That left the so-called security question: "Where did you meet your...
-
WASHINGTON (AP) - Details emerged Thursday behind the break-in of Republican vice presidential candidate Sarah Palin's e-mail account, including a first-hand account suggesting it was vulnerable because a hacker was able to impersonate her online to obtain her password.
-
This isn't about some kind of boycott of Yahoo. It's all about privacy. I'm heading over to Yahoo to delete everything in my online account. If hacking is this easy, then something's bad broke. Not that I'm famous enough for anyone to want to invade my privacy...but who knows what some nutcase might find valuable. Get out, get out, whoever you are. FreeRepublic2 -- reconsider if Yahoo is a good place for a backup FR site.
-
Pentagon Makes Fighting Extremism Top Priority Seven years after the Sept. 11 attacks, the Pentagon on Thursday officially named "the long war" against global extremism as its top priority and pledged to avert any conventional military threat from China or Russia through dialogue. The Defense Department, in a new national defense strategy, also emphasized the need to subordinate military operations to "soft power" initiatives to undermine Islamist militancy by promoting economic, political and social development in vulnerable corners of the world. Defense Secretary Robert Gates said he hoped the change would help establish permanent institutional support for counterinsurgency skills...
-
Updated 08/09/08 20:18 Israel time Israel Insider has withstood a "trojan horse" hack attack on its website. An agent exploited Talkback to insert malicious code on a page about Obama's dubious birth certificate. While the hacker failed to bring down the site, and all pages are available for reading, we're suspending talkback service and will make other improvements to our security. Our apologies for the inconvenience. We'll be back soon, stronger than before.
-
Marisel Garcia is one of eight or nine women in the Gainesville, Florida who is a victim of a Webcam Spy Hacker voyeurism scandal, orchestrated by Craig Feigin. Craig Feigin, a computer programmer, worked on Marisel Garcia's computer to fix her laptop. When she got her machine back from Feigin, it had a slew of other problems so she brought it to another area repair man. One of the new problems was that the computer's built-in camera light came on every time she was near the machine. When Marisel Garcia got her computer back, she learned that Craig Feigin had...
-
A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. The new form of attack indicates that little progress has been made in defusing the threat of botnets, networks of infected computers that criminals use to send spam, steal passwords and do other forms of damage, according to computer security investigators. Several security experts say that although attacks against network administrators are not new, the systematic use of administrative software to spread malicious software...
-
Gary McKinnon, the British hacker who broke into military computers looking for evidence of UFOs in the "biggest military hack of all time," did so using his home computer and a 56k modem. I think we just lost our rights to complain about not having Japan-fast broadband. Using his own computer at home in London, McKinnon hacked into 97 computers belonging to and used by the U.S. government between February 2001 and March 2002.McKinnon is accused of causing the entire U.S. Army's Military District of Washington network of more than 2,000 computers to be shut down for 24 hours.Using...
-
The mayor of San Francisco has obtained the password to the city's multimillion-dollar computer network password from a disgruntled employee during a secret jailhouse visit, the San Francisco Chronicle reports. On Monday night, Mayor Gavin Newsom met Terry Childs, a Department of Telecommunications and Information Services employee charged with computer tampering, in a secret meeting and walked away with the password to the city's new FiberWAN (Wide Area Network), the Chronicle said. The system stores such records as officials' e-mails, city payroll files, confidential law enforcement documents and jail bookings. Childs has been held since July 13 and had reportedly...
-
SAN FRANCISCO -- "The first thing I want you to know, Mr. Mayor, is that when you walk out of this room, you will have the computer codes." Those words - delivered to Mayor Gavin Newsom by imprisoned city computer tech Terry Childs in a small, fourth-floor room at city jail Monday - signaled the beginning of the end of the weeklong standoff in which San Francisco officials found themselves in the embarrassing position of being locked out of their own computer system. Childs - whom some have described as a friendly, hard worker at the city Technology Department, and...
-
SAN FRANCISCO -- The San Francisco computer engineer accused of withholding access codes to the city's network surrendered the password during an unusual jailhouse visit by Mayor Gavin Newsom, authorities said Tuesday. Newsom came away with the access codes Monday night after talking with Terry Childs, 43, of Pittsburg, who has been held since July 13 on four felony counts stemming from what prosecutors describe as an effort to block administrative access to the network that handles 60 percent of the city's information, including sensitive law enforcement, payroll and jail booking records. Childs had given officials what turned out to...
-
Security researcher and author Kris Kaspersky plans to demonstrate how an attacker can target flaws in Intel's microprocessors to remotely attack a computer using JavaScript or TCP/IP packets, regardless of what operating system the computer is running. Kaspersky will demonstrate how such an attack can be made in a presentation at the upcoming Hack In The Box (HITB) Security Conference in Kuala Lumpur, Malaysia, during October. The proof-of-concept attacks will show how processor bugs, called errata, can be exploited using certain instruction sequences and a knowledge of how Java compilers work, allowing an attacker to take control of the...
-
SAN FRANCISCO -- A disgruntled city computer engineer has virtually commandeered San Francisco's new multimillion-dollar computer network, altering it to deny access to top administrators even as he sits in jail on $5 million bail, authorities said Monday. Terry Childs, a 43-year-old computer network administrator who lives in Pittsburg, has been charged with four counts of computer tampering and is scheduled to be arraigned Tuesday. Prosecutors say Childs, who works in Department of Technology at a base salary of just over $126,000, tampered with the city's new FiberWAN (Wide Area Network), where records such as officials' e-mails, city payroll files,...
-
Photobucket, the popular photo sharing website, became the target of a DNS hack on Tuesday. As a result of the attack some (but not all) surfers hoping to check out pictures were involuntarily redirected to a greeting from hacker NetDeliz and a message in Turkish. A post to Photobucket's user forum blamed the problem on "an error in our DNS hosting services". It stressed that users' personal information was not affected by the redirection. On Tuesday afternoon, some users that typed in the Photobucket.com URL were temporarily redirected to an incorrect page due to an error in our DNS hosting...
-
Jim Louderback, CEO of internet TV network Revision3, is considering legal action against anti-piracy firm MediaDefender after an internal investigation revealed it to be the source of a Memorial Day weekend Denial of Service attack against Revision3’s computer network.
-
Computer hackers in China, including those working on behalf of the Chinese government and military, have penetrated deeply into the information systems of U.S. companies and government agencies, stolen proprietary information from American executives in advance of their business meetings in China, and, in a few cases, gained access to electric power plants in the United States, possibly triggering two recent and widespread blackouts in Florida and the Northeast, according to U.S. government officials and computer-security experts. One prominent expert told National Journal he believes that China’s People’s Liberation Army played a role in the power outages. Tim Bennett, the...
|
|
|