Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $34,168
42%  
Woo hoo!! And we're now over 42%!! Thank you all very much!! God bless.

Keyword: hackers

Brevity: Headers | « Text »
  • Protest Warrior Hacked???

    08/22/2004 3:23:41 PM PDT · by sc2_ct · 18 replies · 1,208+ views
    From Email | Some Hacker Person
    X-Message-Info: JGTYoYF78jGFBukigP7pto9WwRgU8avv Received: from dedicated.protestwarrior.com ([207.234.145.250]) by mc10-f20.hotmail.com with Microsoft SMTPSVC(5.0.2195.6824); Sun, 22 Aug 2004 14:26:57 -0700 Received: (qmail 29117 invoked by uid 48); 22 Aug 2004 23:20:57 -0000 Date: 22 Aug 2004 23:20:57 -0000 Message-ID: <20040822232057.29116.qmail@dedicated.protestwarrior.com> To: Subject: Protest Warrior Hacked: Operation Right-wing Circle Jerk From: kfir@protestwarrior.com Return-Path: anonymous@dedicated.protestwarrior.com X-OriginalArrivalTime: 22 Aug 2004 21:26:58.0054 (UTC) FILETIME=[C1277A60:01C4888E] Modern day nazis pledging their obedience to the State and the platform of state-sponsored terrorism - neo-fascist ProtestWarriors, you have been HACKED by your friendly neighborhood hacker anarchist =) Right-wing extremists are modern-day brown shirts who abuse and harass activists who are fighting...
  • Viruses lurking in 'news' photos

    07/28/2004 10:20:22 AM PDT · by solicitor77 · 18 replies · 1,021+ views
    A weekly series by UPI examining the global telecommunications phenomenon known as the World Wide Web. -- CHICAGO, July 28 (UPI) -- Computer hooligans are increasingly employing more sophisticated techniques to trick unsuspecting consumers and infect their PCs with viruses, including embedding malicious code in fabricated news images, such as those posted on the Internet last week purporting to show terrorist madman Osama bin Laden dead from suicide. "If you are going to talk about trends in malware -- malicious code -- you must talk about trends in overall computer technology," said Sam Curry, the vice president of security management...
  • Acxiom Hackers Face 144-count Federal Indictment ("The Biggest Cyber-Crime Ever Prosecuted")

    07/21/2004 4:17:29 PM PDT · by HAL9000 · 100 replies · 1,994+ views
    arkansasbusiness.com ^ | July 21, 2004 | Gwen Moritz
    Federal prosecutors on Wednesday announced a 144-count indictment against a Florida businessman for allegedly hacking personal information on millions of Americans from Acxiom Corp. databases over a 17-month period. Prosecutors claimed that Scott Levine, 45, of Boca Raton, Fla.-based Snipermail.com Inc., accessed Acxiom databases between April 2002 and August 2003. Information accessed included names, addresses, e-mail addresses, customer demographics, and probably some birth dates and social security numbers. “It may be the biggest cyber-crime ever prosecuted and investigated,” said assistant U.S. Attorney Sandra Cherry during a news conference at the U.S. Attorney’s Little Rock office. It alleges 139 instances...
  • Beijing blamed for wave of cyber attacks

    07/18/2004 7:14:19 PM PDT · by wagglebee · 9 replies · 567+ views
    Financial Times ^ | 7/17/04 | Andrew Ward
    Chinese hackers have been blamed for a wave of attacks on South Korean government computers, the latest in a series of internet security breaches in which China is alleged to have been involved. The US, Taiwan and the Dalai Lama are among other victims of suspected Chinese cyber sabotage in recent years. Nearly 300 South Korean government computers have been infected recently with viruses capable of stealing passwords and other sensitive information. The National Assembly and an atomic energy research institute are among 10 agencies penetrated by the hackers, who were traced to China by the Korean intelligence service. "The...
  • Hugh Hewitt's website -- Has it been hacked?

    07/02/2004 10:07:49 PM PDT · by BoilermakerCAengineerguy · 23 replies · 655+ views
    http://www.hughhewitt.com ^ | 07/02/04 | BoilerMakerCAengineerguy
    Has Hugh Hewitt's website been hacked? I keep getting this message -- "bloodbr - the dark side of the linux - bloodbr@hackermail.com" -- whenever I try to go to http://www.hughhewitt.com Does anyone know anything about this? Or is it just my computer? Thanks!
  • Microsoft Blames Hackers, Not Zero-Day Vulnerability, For Web Attack

    06/30/2004 7:53:51 PM PDT · by NotQuiteCricket · 18 replies · 342+ views
    securitypipeline.com ^ | June 28, 2004 | Gregg Keizer
    The Web attack that was stopped dead in its tracks on Friday when a Russian Web site was taken offline remained under investigation Monday by a host of security firms still puzzled over the method used to infect a number of Microsoft Internet Information Services (IIS) servers. But the evidence now is leading them to accept Microsoft's explanation that the IIS 5.0 servers were hacked manually and that the server software doesn't have an unknown, or so-called "zero-day," vulnerability. "Nobody yet knows how these servers were infected," said Ken Dunham, the director of malicious code research at iDefense. "But if...
  • Sample of SPAM and POP-UP Advertising

    06/29/2004 12:20:22 AM PDT · by AnimalLover · 48 replies · 1,075+ views
    Inet-Traffic ^ | Reviewed 6-28-04 | N/A
    PopUnder Ads | Banner Ad Packages | Pop-UP Ads | FAQ's | Customer Service | Our Network --------------------------------------------------------- Advertiser Statistics: · Stats Login Traffic Products: · Banner Advertising · Pop-Under Advertising · Pop-UP Advertising · Website Banner Production Savings Packages Based on availability. Don't miss out on these bargains. PopUnder Code Generator Create your popunder ad with our free pop-under code generator. No matter how well designed your website is, if people cannot find it, then you cannot reach your potential for the site. Establish your web presence today with the most affordable marketing packages available on the Internet. At...
  • Wireless World: Hackers target cell phones

    06/25/2004 10:41:11 AM PDT · by solicitor77 · 4 replies · 827+ views
    CHICAGO, June 25 (UPI) -- A hacker sits on a bench at Grand Central Station in New York City and, with his mobile phone and a Wireless Fidelity connection, deviously places a virus on the cell phones of unsuspecting commuters as they walk nearby, on their way to work. Within a few hours, the virus multiplies, infecting several hundred thousand phones, causing them to dial long distance numbers and run up millions of dollars in fraudulent telecom charges. Fantasy? No -- the coming reality. Viruses and worms on mobile phones are now considered by computer gurus to be a legitimate...
  • Mysterious Attack Hits Web Servers

    06/25/2004 9:12:00 AM PDT · by all4one · 44 replies · 409+ views
    The WGALchannel.com ^ | June 25, 2004 | Internet Broadcasting System, API
    Government and industry experts are reporting a mysterious, large-scale Internet attack against thousands of popular Web sites. The virus-like infection tries to implant hacker software onto the computers of all Web site visitors. Industry experts and the Homeland Security Department are studying the infection to determine how it spreads across Web sites and find adequate defenses against it. A government warning says even Web sites trusted by users may contain the potentially malicious code. The infection appears to target at least one recent version of Microsoft's Internet Information Server, which is popular among businesses and organizations. The United States Computer...
  • North Korean military hackers unleash "cyber-terror" on South Korean computers

    05/27/2004 2:41:57 PM PDT · by LonghornFreeper · 6 replies · 3,088+ views
    SEOUL, (AFP) - South Korea's top military intelligence chief says North Korea is operating an elite military unit specializing in hacking into South Korean computer networks. Song Young-Keun, commanding general of the counter-intelligence Defense Security Command, said at a conference here that North Korea was building up its "cyber-terror" capability on orders from its leader, Kim Jong-Il. "Following orders from Chairman Kim Jong-Il, North Korea has been operating a crack unit specializing in computer hacking and strengthening its cyber-terror ability," he said in a keynote speech. The conference was organized by the Korea Information Security Agency affiliated with the information...
  • Symantec Scrambles to Fix Firewall Flaws (for Norton users)

    05/13/2004 4:03:11 PM PDT · by JoJo Gunn · 60 replies · 1,426+ views
    InternetNews.com ^ | May 13, 2004 | Ryan Naraine
    Computer security specialist Symantec Thursday moved swiftly to patch for four very serious vulnerabilities in its popular Norton firewall product suite. An alert from Cupertino, Calif.-based Symantec described the flaws as "high risk" and warned that a successful exploit could wipe out a user's computer. Attackers could also execute remote code with kernel-level privileges on the targeted system. The vulnerabilities, first discovered by researchers at eEye Digital Security, affect both enterprise and consumer Norton users. Affected products include the Symantec Client Firewall 5.01 and 5.1.1; the Symantec Client Security 1.0, 1.1, 2.0 (SCF 7.1); the Norton Internet Security and Professional...
  • Milwaukee expert uncovers serious Web vulnerability

    04/20/2004 9:55:08 PM PDT · by Hillarys Gate Cult · 5 replies · 140+ views
    JS ONLINE ^ | April 20, 2004 | ADAM BERGSTROM
    A Milwaukee computer security expert's research has helped discover a potential for serious Internet traffic-flow vulnerabilities. Left unchecked, hackers could disrupt Web surfing, e-mail and other forms of electronic communication. Paul Watson, who works for Rockwell Automation's Information Security Group, has been working with the British government's National Infrastructure Security Coordination Centre. The organization released information Tuesday addressing flaws that could allow hackers to knock computers off-line and disrupt vital traffic-directing devices, called routers, that coordinate the flow of data among distant groups of computers. "It's a vulnerability that everyone has known about but never really talked about," Watson, 35,...
  • ATTENTION ALL FREEPERS: Ten Types Of Web Attacks (Requires Flash)

    04/19/2004 3:15:17 PM PDT · by rdb3 · 19 replies · 273+ views
    Sanctum, Inc. ^ | Unknown | Sanctum
    Be advised. This will show you some nefarious things that can happen to your system. You're all reading this online so, yes, it affects you. Please read, then act accordingly. Click here. This is not a joke. You'll now be returned to your regular programming. A.K.A. Sleepy Brown
  • No Chip in Arm, No Shot From Gun

    04/16/2004 5:18:11 PM PDT · by Momaw Nadon · 58 replies · 682+ views
    AP via Wired News ^ | Wednesday, April 14, 2004 | Associated Press
    <p>PALM BEACH, Florida -- A new computer chip promises to keep police guns from firing if they fall into the wrong hands.</p> <p>The tiny chip would be implanted in a police officer's hand and would match up with a scanning device inside a handgun. If the officer and gun match, a digital signal unlocks the trigger so it can be fired. But if a child or criminal would get hold of the gun, it would be useless.</p>
  • State Computers Systems completely shut down in Arkansas....

    04/16/2004 3:34:01 PM PDT · by TheBattman · 40 replies · 343+ views
    4/16/2004 | Me
    I hadn’t heard anything via the news today, but the DIS (Department of Information Services) the department responsible for upkeep of the state’s computer systems (Government, Schools, etc.) instructed all schools statewide that all computers, including workstations, servers, etc. MUST be shut down at the end of the school day today (Friday 4/16/2004). This is to apply to ALL computers tied in with the state network. The reason? An unmanageable number of viruses and an attack by hackers (probably allowed in via the email worms infecting the system). The network is suppose to be completely down through 8:00 AM Monday...
  • Soviets Burned By CIA Hackers?

    03/26/2004 11:03:34 PM PST · by LibWhacker · 4 replies · 258+ views
    Wired ^ | 3/26/04 | Steve Kettmann
    <p>The author of a new book detailing a plan to use a Trojan horse embedded in stolen software to wage economic war against the Soviet Union fired back Thursday at charges the book's revelations are "rubbish."</p> <p>Thomas C. Reed, a former secretary of the Air Force and special assistant to President Reagan, detailed the stunning story in At the Abyss: An Insider's History of the Cold War.</p>
  • Black Demon targets computer hackers (USA troops bump)

    03/26/2004 5:49:08 PM PST · by bogdanPolska12 · 11 replies · 231+ views
    www.stripes.com ^ | By Marni McEntee
    RAMSTEIN AIR BASE, Germany — Air Force computer gurus are entrenched in a cyber war against themselves. Just as Air Force pilots fly mock dogfights during their exercises, so too do network security experts battle imaginary foes to train for the real world. This week, nine Air Force major commands and two Air Force agencies are engaged in Exercise Black Demon to root out insidious computer hackers who would seek to destroy the Air Force’s operations with but a few keystrokes. “Just like our pilots and air crews want to gain air and space superiority, we want to gain network...
  • Hackers plot huge attack on PC users

    03/18/2004 1:36:47 PM PST · by Rams82 · 57 replies · 626+ views
    This is London ^ | 4/17/04 | Mark Prigg
    Hackers are preparing to launch a massive attack on millions of home PC users, experts have warned. They believe the current explosion in the number of email viruses - including MyDoom, netsky and bagle - is laying the groundwork for a systematic attack. The experts suspect that organised crime syndicates could be involved. Millions of computers across the world have been infected by one of the unprecedented number of viruses circulating. Some viruses have been designed so that when they infect a computer, they install an "electronic backdoor". This can be used later to hack into the infected computer and...
  • Hackers break into California state server

    02/13/2004 11:29:03 PM PST · by calcowgirl · 5 replies · 58+ views
    AP via North County Times ^ | February 13, 2004 | ASSOCIATED PRESS
    SACRAMENTO, Calif. (AP) - Hackers broke into a state agency's server containing the sensitive personal information of tens of thousands of people who work as nannies, butlers, and gardeners, and those who employ them. Evidence of a computer break-in at the Employment Development Department was discovered Jan. 20 during a routine check and immediately shut down the server that holds information on household workers and their employers, spokesman Kevin Callori said Friday. The server houses information on about 90,000 people. The hackers gained access to employee's names, Social Security numbers and wage records, and some employers' Social Security numbers, Callori...
  • Windows 2000 & Windows NT 4 Source Code Leaks

    02/12/2004 2:31:30 PM PST · by Dinsdale · 42 replies · 229+ views
    Slashdot ^ | 2/12/04 | Slashdot
    PeterHammer writes "Neowin.net is reporting that Windows 2000 and Windows NT source code has been leaked to the internet. More on this as we hear it."