Free Republic 4th Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $32,806
40%  
Woo hoo!! And now only $404 to reach 41%!! Thank you all very much!! God bless.

Keyword: hackers

Brevity: Headers | « Text »
  • Hacker hits UC-Berkeley computer

    10/20/2004 8:25:39 AM PDT · by roaddog727 · 12 replies · 663+ views
    Reuters ^ | 20 October 2004 | Staff Reporter
    SAN FRANCISCO - A computer hacker accessed names and Social Security numbers of about 1.4 million Californians after breaking into a University of California, Berkeley, computer system in perhaps the worst attack of its kind ever suffered by the school, officials said Tuesday.
  • N Korea’s computer hackers target South and US

    10/04/2004 6:45:50 PM PDT · by wagglebee · 13 replies · 523+ views
    Financial Times ^ | 10/4/04 | Anna Fifield
    North Korea has trained as many as 600 computer hackers to be capable of launching a cyber-war on South Korea, the US or Japan, South Korea’s defence ministry said on Monday. Coming amid intelligence reports that Pyongyang might be preparing to test a ballistic missile, the report will exacerbate jitters over the extent of the communist state’s destructive ability. “North Korea’s intelligence warfare capability is estimated to have reached the level of advanced countries,” the ministry said in a report to the National Assembly’s national defence committee. North Korea’s military command has 500 to 600 hacking staff who have undertaken...
  • North Korea ready to launch cyber war -- defense ministry report

    10/03/2004 9:24:05 PM PDT · by HAL9000 · 22 replies · 647+ views
    Agence France Presse | October 4, 2004
    SEOUL, Oct 4 (AFP) - North Korea has trained more than 500 computer hackers capable of launching cyber warfare against the United States, South Korea's defense ministry said Monday. In a report to the National Assembly's National Defense Committee, the ministry said that hackers from the impoverished Stalinist state were among the best in the world. "North Korea's intelligence warfare capability is estimated to have reached the level of advanced countries," the report said, according to Yonhap news agency. The military hackers had been put through a five-year university course training them to penetrate the computer systems of South...
  • Real-world wardriving arrests

    10/03/2004 9:36:46 AM PDT · by gitmo · 24 replies · 917+ views
    ZDNet ^ | September 17, 2004 | Robert Vamosi
    SNIP At some point in their wardriving experience, Timmins and Botbyl came upon a Lowe's hardware store with an open wireless network. Timmins later admitted to Kevin Poulsen of Security Focus that what he did next was technically illegal: he used the Lowe's network to check his e-mail. When he realized it was Lowe's private network, however, he says, he disconnected. That in itself might have been the end of the story. However, Lowe's became aware of the breach and contacted the FBI, who, after its investigation, charged Timmins with one count of unauthorized computer access. And that by itself...
  • Hackers attack Al Qaeda-linked websites

    09/28/2004 8:02:50 PM PDT · by Jim Robinson · 47 replies · 1,592+ views
    ABC News Online (AU) ^ | September 29, 2004 | Reuters
    Hackers attack Al Qaeda-linked websites Hackers have attacked a website of an Al Qaeda-linked group, that beheaded two US hostages in Iraq, re-routing visitors to a page showing a penguin toting a machine gun and warning against hosting such sites. The site of the Tawhid and Jihad Group of Al Qaeda ally Abu Musab al-Zarqawi, set up on a site providing free web hosting, last week carried a tape of British hostage Kenneth Bigley appealing for his life as well as videos of the decapitation of the two US hostages. "Host them and your next!" was the message left on...
  • Hackers Target GOP Websites (Get This)

    08/30/2004 5:26:40 PM PDT · by Angry Republican · 18 replies · 926+ views
    News Central ^ | August 19, 2004 | Morris Jones
    We've been telling you about protestor plans to disrupt the Republican Convention in New York City. Tie up traffic, nobody would notice. But tie up the internet and you've got problems. Get this, political dissent has changed a lot since the last Republican Convention. This year hackers are threatening to shut down GOP websites. They've become a valuable tool for candidates. For example, 50 thousand people an hour were visiting John Kerry's site after his acceptance speech. The same is expected for Bush, but protestors are lurking in cyber space. And real terrorists may have found another soft spot within...
  • Beware that WinAmp skin

    08/26/2004 5:29:23 PM PDT · by JoJo Gunn · 34 replies · 2,802+ views
    Internetnews.com ^ | August 26, 2004 | Ryan Naraine
    Beware That WinAmp Skin By Ryan Naraine August 26, 2004 The popular skinning feature in Nullsoft's WinAmp media player has left the door wide open for malicious attackers to hijack PCs. Security researchers at K-Otik discovered the vulnerability and released details of a "Skinhead" zero-day exploit that is already spreading in the wild. The exploit, which targets WinAmp versions 3.x and 5.x, is being used to forcefully install spyware and Trojans on infected systems. Secunia has tagged the flaw as "extremely critical," its highest rating. WinAmp skins have a huge following because they allow users to adopt colorful, customizable...
  • PROTEST WARRIOR HEADQUARTERS BACK UP AND RUNNING

    08/23/2004 1:13:43 PM PDT · by YoungHickey · 15 replies · 1,218+ views
    PROTEST WARRIOR HEADQUARTERS BACK UP AND RUNNING
  • Protest Warrior Hacked???

    08/22/2004 3:23:41 PM PDT · by sc2_ct · 18 replies · 1,208+ views
    From Email | Some Hacker Person
    X-Message-Info: JGTYoYF78jGFBukigP7pto9WwRgU8avv Received: from dedicated.protestwarrior.com ([207.234.145.250]) by mc10-f20.hotmail.com with Microsoft SMTPSVC(5.0.2195.6824); Sun, 22 Aug 2004 14:26:57 -0700 Received: (qmail 29117 invoked by uid 48); 22 Aug 2004 23:20:57 -0000 Date: 22 Aug 2004 23:20:57 -0000 Message-ID: <20040822232057.29116.qmail@dedicated.protestwarrior.com> To: Subject: Protest Warrior Hacked: Operation Right-wing Circle Jerk From: kfir@protestwarrior.com Return-Path: anonymous@dedicated.protestwarrior.com X-OriginalArrivalTime: 22 Aug 2004 21:26:58.0054 (UTC) FILETIME=[C1277A60:01C4888E] Modern day nazis pledging their obedience to the State and the platform of state-sponsored terrorism - neo-fascist ProtestWarriors, you have been HACKED by your friendly neighborhood hacker anarchist =) Right-wing extremists are modern-day brown shirts who abuse and harass activists who are fighting...
  • Viruses lurking in 'news' photos

    07/28/2004 10:20:22 AM PDT · by solicitor77 · 18 replies · 1,021+ views
    A weekly series by UPI examining the global telecommunications phenomenon known as the World Wide Web. -- CHICAGO, July 28 (UPI) -- Computer hooligans are increasingly employing more sophisticated techniques to trick unsuspecting consumers and infect their PCs with viruses, including embedding malicious code in fabricated news images, such as those posted on the Internet last week purporting to show terrorist madman Osama bin Laden dead from suicide. "If you are going to talk about trends in malware -- malicious code -- you must talk about trends in overall computer technology," said Sam Curry, the vice president of security management...
  • Acxiom Hackers Face 144-count Federal Indictment ("The Biggest Cyber-Crime Ever Prosecuted")

    07/21/2004 4:17:29 PM PDT · by HAL9000 · 100 replies · 1,994+ views
    arkansasbusiness.com ^ | July 21, 2004 | Gwen Moritz
    Federal prosecutors on Wednesday announced a 144-count indictment against a Florida businessman for allegedly hacking personal information on millions of Americans from Acxiom Corp. databases over a 17-month period. Prosecutors claimed that Scott Levine, 45, of Boca Raton, Fla.-based Snipermail.com Inc., accessed Acxiom databases between April 2002 and August 2003. Information accessed included names, addresses, e-mail addresses, customer demographics, and probably some birth dates and social security numbers. “It may be the biggest cyber-crime ever prosecuted and investigated,” said assistant U.S. Attorney Sandra Cherry during a news conference at the U.S. Attorney’s Little Rock office. It alleges 139 instances...
  • Beijing blamed for wave of cyber attacks

    07/18/2004 7:14:19 PM PDT · by wagglebee · 9 replies · 567+ views
    Financial Times ^ | 7/17/04 | Andrew Ward
    Chinese hackers have been blamed for a wave of attacks on South Korean government computers, the latest in a series of internet security breaches in which China is alleged to have been involved. The US, Taiwan and the Dalai Lama are among other victims of suspected Chinese cyber sabotage in recent years. Nearly 300 South Korean government computers have been infected recently with viruses capable of stealing passwords and other sensitive information. The National Assembly and an atomic energy research institute are among 10 agencies penetrated by the hackers, who were traced to China by the Korean intelligence service. "The...
  • Hugh Hewitt's website -- Has it been hacked?

    07/02/2004 10:07:49 PM PDT · by BoilermakerCAengineerguy · 23 replies · 655+ views
    http://www.hughhewitt.com ^ | 07/02/04 | BoilerMakerCAengineerguy
    Has Hugh Hewitt's website been hacked? I keep getting this message -- "bloodbr - the dark side of the linux - bloodbr@hackermail.com" -- whenever I try to go to http://www.hughhewitt.com Does anyone know anything about this? Or is it just my computer? Thanks!
  • Microsoft Blames Hackers, Not Zero-Day Vulnerability, For Web Attack

    06/30/2004 7:53:51 PM PDT · by NotQuiteCricket · 18 replies · 342+ views
    securitypipeline.com ^ | June 28, 2004 | Gregg Keizer
    The Web attack that was stopped dead in its tracks on Friday when a Russian Web site was taken offline remained under investigation Monday by a host of security firms still puzzled over the method used to infect a number of Microsoft Internet Information Services (IIS) servers. But the evidence now is leading them to accept Microsoft's explanation that the IIS 5.0 servers were hacked manually and that the server software doesn't have an unknown, or so-called "zero-day," vulnerability. "Nobody yet knows how these servers were infected," said Ken Dunham, the director of malicious code research at iDefense. "But if...
  • Sample of SPAM and POP-UP Advertising

    06/29/2004 12:20:22 AM PDT · by AnimalLover · 48 replies · 1,075+ views
    Inet-Traffic ^ | Reviewed 6-28-04 | N/A
    PopUnder Ads | Banner Ad Packages | Pop-UP Ads | FAQ's | Customer Service | Our Network --------------------------------------------------------- Advertiser Statistics: · Stats Login Traffic Products: · Banner Advertising · Pop-Under Advertising · Pop-UP Advertising · Website Banner Production Savings Packages Based on availability. Don't miss out on these bargains. PopUnder Code Generator Create your popunder ad with our free pop-under code generator. No matter how well designed your website is, if people cannot find it, then you cannot reach your potential for the site. Establish your web presence today with the most affordable marketing packages available on the Internet. At...
  • Wireless World: Hackers target cell phones

    06/25/2004 10:41:11 AM PDT · by solicitor77 · 4 replies · 827+ views
    CHICAGO, June 25 (UPI) -- A hacker sits on a bench at Grand Central Station in New York City and, with his mobile phone and a Wireless Fidelity connection, deviously places a virus on the cell phones of unsuspecting commuters as they walk nearby, on their way to work. Within a few hours, the virus multiplies, infecting several hundred thousand phones, causing them to dial long distance numbers and run up millions of dollars in fraudulent telecom charges. Fantasy? No -- the coming reality. Viruses and worms on mobile phones are now considered by computer gurus to be a legitimate...
  • Mysterious Attack Hits Web Servers

    06/25/2004 9:12:00 AM PDT · by all4one · 44 replies · 409+ views
    The WGALchannel.com ^ | June 25, 2004 | Internet Broadcasting System, API
    Government and industry experts are reporting a mysterious, large-scale Internet attack against thousands of popular Web sites. The virus-like infection tries to implant hacker software onto the computers of all Web site visitors. Industry experts and the Homeland Security Department are studying the infection to determine how it spreads across Web sites and find adequate defenses against it. A government warning says even Web sites trusted by users may contain the potentially malicious code. The infection appears to target at least one recent version of Microsoft's Internet Information Server, which is popular among businesses and organizations. The United States Computer...
  • North Korean military hackers unleash "cyber-terror" on South Korean computers

    05/27/2004 2:41:57 PM PDT · by LonghornFreeper · 6 replies · 3,088+ views
    SEOUL, (AFP) - South Korea's top military intelligence chief says North Korea is operating an elite military unit specializing in hacking into South Korean computer networks. Song Young-Keun, commanding general of the counter-intelligence Defense Security Command, said at a conference here that North Korea was building up its "cyber-terror" capability on orders from its leader, Kim Jong-Il. "Following orders from Chairman Kim Jong-Il, North Korea has been operating a crack unit specializing in computer hacking and strengthening its cyber-terror ability," he said in a keynote speech. The conference was organized by the Korea Information Security Agency affiliated with the information...
  • Symantec Scrambles to Fix Firewall Flaws (for Norton users)

    05/13/2004 4:03:11 PM PDT · by JoJo Gunn · 60 replies · 1,426+ views
    InternetNews.com ^ | May 13, 2004 | Ryan Naraine
    Computer security specialist Symantec Thursday moved swiftly to patch for four very serious vulnerabilities in its popular Norton firewall product suite. An alert from Cupertino, Calif.-based Symantec described the flaws as "high risk" and warned that a successful exploit could wipe out a user's computer. Attackers could also execute remote code with kernel-level privileges on the targeted system. The vulnerabilities, first discovered by researchers at eEye Digital Security, affect both enterprise and consumer Norton users. Affected products include the Symantec Client Firewall 5.01 and 5.1.1; the Symantec Client Security 1.0, 1.1, 2.0 (SCF 7.1); the Norton Internet Security and Professional...
  • Milwaukee expert uncovers serious Web vulnerability

    04/20/2004 9:55:08 PM PDT · by Hillarys Gate Cult · 5 replies · 140+ views
    JS ONLINE ^ | April 20, 2004 | ADAM BERGSTROM
    A Milwaukee computer security expert's research has helped discover a potential for serious Internet traffic-flow vulnerabilities. Left unchecked, hackers could disrupt Web surfing, e-mail and other forms of electronic communication. Paul Watson, who works for Rockwell Automation's Information Security Group, has been working with the British government's National Infrastructure Security Coordination Centre. The organization released information Tuesday addressing flaws that could allow hackers to knock computers off-line and disrupt vital traffic-directing devices, called routers, that coordinate the flow of data among distant groups of computers. "It's a vulnerability that everyone has known about but never really talked about," Watson, 35,...