Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $7,814
9%  
Woo hoo!! 3rd Qtr 2025 FReepathon is now underway!!

Keyword: hackers

Brevity: Headers | « Text »
  • Harvard student database hacked, posted on BitTorrent

    03/14/2008 2:01:03 AM PDT · by TigerLikesRooster · 10 replies · 817+ views
    ZDNet Asia ^ | 03/14/08 | Robert Vamosi
    Harvard student database hacked, posted on BitTorrent By Robert Vamosi, CNET News.com Friday, March 14, 2008 12:03 PM Harvard University says about 10,000 of last year's applicants may have had their personal information compromised. At least 6,600 Social Security numbers were exposed. Worse, a compressed 125 M-byte file containing the stolen student data is currently available via BitTorrent, a peer-to-peer network. In a statement published Monday night Harvard officials said the database containing summaries of GSAS applicant data for entry to the Fall 2007 academic year, summaries of GSAS housing applicant data for the 2007-08 and 2006-07 academic years, and...
  • Hackers launch massive IFrame attack

    03/13/2008 2:45:38 PM PDT · by JerseyHighlander · 48 replies · 1,937+ views
    ComputerWorld.com ^ | March 13, 2008 | Gregg Keizer
    Hackers launch massive IFrame attack Gregg Keizer March 13, 2008 (Computerworld) Hackers using a new scam continue to subvert hundreds of thousands of Web pages with IFrame redirects that send unwary users to malware-spewing sites, researchers said today. The attacks, which began about a week ago, show no signs of slowing, said Dancho Danchev in a posting to his blog yesterday. "The group is continuing to expand the campaign," said the Bulgarian researcher. "These are the high-profile sites targeted by the same group within the past 48 hours, with the number of locally cached and IFrame-injected pages within their search...
  • Security Card Chip Can Be Hacked

    03/12/2008 4:00:45 PM PDT · by kiriath_jearim · 5 replies · 203+ views
    Breitbart ^ | 3/12/08 | TOBY STERLING
    AMSTERDAM, Netherlands (AP) - The Dutch interior affairs minister says a technology being used in up to a billion security cards around the world can easily be hacked. The "Mifare" chip technology owned and licensed by NXP Semiconductors is frequently used in public transport systems such as London's "Oyster" card. It is also used by corporations and governments in "swipe" access cards. Guusje ter Horst said Wednesday that researchers at the Radboud University in Nijmegen have "developed a method by which a large number of (Mifare) chip-cards is relatively easy to crack and duplicate." Ter Horst wrote in a letter...
  • Al-Qaeda recruiting geeks to run multimedia operation

    03/08/2008 11:59:10 AM PST · by 2ndDivisionVet · 12 replies · 620+ views
    The Taipei Times ^ | March 9, 2008 | Kathy Gannon
    One expert said some productions made by the terror group were 'good enough to put on the Discovery Channel' PESHAWAR, PAKISTAN In an Internet age, al-Qaeda prizes geek jihadis as much as would-be suicide bombers and gunmen. The terror network is recruiting computer-savvy technicians to produce sophisticated Web documentaries and multimedia products aimed at Muslim audiences in the US, Britain and other Western countries. Already, the terror movement's al-Sahab production company is turning out high quality material, some of which rivals productions by Western media companies. The documentaries appear regularly on Islamist Web sites, which al-Qaeda uses to recruit followers...
  • Chinese cyberattacks on experts

    03/07/2008 7:47:26 AM PST · by BGHater · 9 replies · 279+ views
    UPI ^ | 06 Mar 2008 | SHAUN WATERMAN
    Defense-related think tanks and contractors, as well as the Pentagon and other U.S. agencies, were the target of repeated computer network intrusions last year apparently originating in China, the Department of Defense said this week. In its annual report to lawmakers on China's military power, the department said the intrusions "appeared to originate in" China but added, "It is unclear if these intrusions were conducted by, or with the endorsement of" the Chinese government or military. The report gave few details, but one China expert who works in the private sector told United Press International that in the last 18...
  • (Skeptical) Global Warming Site Shutdown by Hackers (AGW Denial-of-Service Attack)

    03/01/2008 9:53:55 AM PST · by Robert A Cook PE · 20 replies · 459+ views
    CO2 Science ^ | Mar 01 2008 | Robert A Cook
    CO2 Science is an excellent reference source for hundreds of global warming and CO2 research studies debunking the media's AGW hysterical outbursts. They clearly show their 25% increase in plant production due to today's higher CO2 levels, the high temperatures common across the world during the Chinese, Roman, and Medieval Warm Period, plus the cold intervals of the Dark Age of 450-700 AD, Little Ice in 1600 AD. Well, it looks like CO2 Science paid the price for opposing today's international socialist agenda to ruin America's economy: Their web site was shutdown by a denial-of-service attack, and they are only...
  • Foreign hackers seek to steal Americans' health records

    02/20/2008 5:56:36 PM PST · by BGHater · 19 replies · 132+ views
    Federal Computer Week ^ | 17 Feb 2008 | Nancy Ferris
    Foreign hackers, primarily from Russia and China, are increasingly seeking to steal Americans’ health care records, according to a Department of Homeland Security analyst. Mark Walker, who works in DHS’ Critical Infrastructure Protection Division, told a workshop audience at the National Institute of Standards and Technology that the hackers’ primary motive seems to be espionage. “They’ve been focused on the [Department of Defense] – the military – but now are spreading out into the health care private sector,” Walker said. Early in 2007, a virus was placed on a Centers for Disease Control and Prevention Web site, he said, and...
  • Chinese hackers target government

    02/10/2008 9:45:26 AM PST · by milestogo · 3 replies · 50+ views
    Chinese hackers target government CHINESE computer hackers have launched targeted attacks on classified Australian government computer networks. The cyber attacks has prompted an internal review of IT security, Fairfax newspapers report. The federal government will spend $70 million to improve IT security this year, a figure that could be increased after the recent spate of hackings. The attacks are thought to be part of an international espionage operation to glean intelligence from the western world. Australian intelligence figures are believed to be concerned at a growing level of industrial espionage. The attacks late last year are believed to have been...
  • Hackers break into Internet service at RIT (Rochester N.Y.)

    02/07/2008 9:15:45 AM PST · by Sammy67 · 3 replies · 64+ views
    According to RIT officials, at approximately 5:45 a.m. Wednesday, RIT lost Internet connection for about 90 minutes. During that time, all in-bound Internet traffic was being diverted by hackers to an overseas location. RIT officials believe that hackers in the Indonesia and Korea area tried to take advantage of the RIT
  • 300 ~ Persian Recut - The Truth!

    02/02/2008 6:25:06 PM PST · by freedom44 · 55 replies · 732+ views
    YouTube ^ | 2/3/08 | Youtube
    The Spartans worshipped many Gods. The Persians only one - Ahura Mazda. Zoroastranism a faith which led to Judaism, Christianity and Islam. The Spartans despised democracy. They fought for generations against the Athenians because of their devout hatred towards the concept. The Persians allowed democratic reign, freedom for Satrips and anyone within the empire. Cyrus the Great the founder of the Persian Empire is mentioned 23 times in the Bible and is the only figure dubbed the 'anointed' Cyrus is mentioned some 23 times in the literature of the Old Testament. Isaiah refers to Cyrus as Jehovah’s “shepherd,” the Lord’s...
  • Bush Order Expands Computer Network Monitoring

    01/26/2008 6:28:48 AM PST · by Sammy67 · 4 replies · 30+ views
    Emergency.com ^ | 1/24/08
    Bush Order Expands Network Monitoring Intelligence Agencies to Track Intrusions By Ellen Nakashima, Washington Post Staff Writer WASHINGTON, DC: President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems. The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored. Until now, the government's efforts to protect itself from cyber-attacks -- which run the gamut from hackers to...
  • New Sophos Security Report reveals cybercriminals moving beyond Microsoft - to Macs

    01/22/2008 10:01:00 PM PST · by Swordmaker · 11 replies · 160+ views
    Sophos Press Release ^ | 22 January 2008
    Mac users targeted by financially-motivated hackers for the first timeIT security and control firm, Sophos, has published its Security Threat Report 2008 examining the threat landscape over the previous twelve months, and predicting emerging cybercrime trends for 2008. The report reveals that in 2007 organised criminal gangs for the first time arrived at Apple's doorstep with the intention of stealing money. With proof that hackers are extending their efforts beyond Windows, Sophos is warning computer users of all operating systems not to be complacent about security. Sophos experts note that malware for Macs has been seen before, but until recently,...
  • CIA Says Hackers Pulled Plug on Power Grid

    01/22/2008 7:05:45 PM PST · by lasereye · 9 replies · 126+ views
    Network World ^ | 1/19/08 | Robert McMillan
    Criminals have been able to hack into computer systems via the Internet and cut power to several cities, a U.S. Central Intelligence Agency analyst said this week. Speaking at a conference of security professionals on Wednesday, CIA analyst Tom Donahue disclosed the recently declassified attacks while offering few specifics on what actually went wrong. Criminals have launched online attacks that disrupted power equipment in several regions outside of the U.S., he said, without identifying the countries affected. The goal of the attacks was extortion, he said. "We have information, from multiple regions outside the United States, of cyber intrusions into...
  • CIA Says Hackers Have Cut Power Grid (outside the US)

    01/19/2008 8:29:48 AM PST · by STARWISE · 29 replies · 664+ views
    PC World ^ | 1-19-08 | Robert McMillan, IDG News Service
    Several cities outside the U.S. have sustained attacks on utility systems and extortion demands. Criminals have been able to hack into computer systems via the Internet and cut power to several cities, a U.S. Central Intelligence Agency analyst said this week. Speaking at a conference of security professionals on Wednesday, CIA analyst Tom Donahue disclosed the recently declassified attacks while offering few specifics on what actually went wrong. Criminals have launched online attacks that disrupted power equipment in several regions outside of the U.S., he said, without identifying the countries affected. The goal of the attacks was extortion, he said....
  • International computer hackers threatening to hold cities ransom

    01/18/2008 11:42:50 PM PST · by Sammy67 · 10 replies · 218+ views
    Saturday, January 19, 2008 International computer hackers threatening to hold cities ransom January 18, 2008 CIA says hackers pulled plug on overseas power grid Overseas attacks recently declassified, but some details obscure By Robert McMillan (IDG News Service) -- Criminals have been able to hack into computer systems via the Internet and cut power to several cities, a Central Intelligence Agency analyst said this week. Speaking at a conference of security professionals on Wednesday, CIA analyst Tom Donahue disclosed the recently declassified attacks while offering few specifics on what actually went wrong. Criminals have launched online attacks that disrupted power...
  • Data Theft Has Web-Porn Sites, Customers Worried

    01/14/2008 9:57:10 AM PST · by batter · 13 replies · 767+ views
    FoxNews ^ | 14 Januray 2008 | AP
    MOUNT LAUREL, N.J. — As operators of sex-oriented Web sites gather at the Internext convention in Las Vegas this week, a major leak at a little New Jersey company is likely to be a big topic. Freehold-based Too Much Media, which sells accounting software for adult Web sites, told its customers last month that a security breach on its computers allowed hackers to access various adult Web sites' subscriber lists. Keith Kimmel of Norman, Okla., who runs two Web sites that feature porn, said the breach has the potential to embarrass. "Would you really want a record floating around the...
  • Boeing 787 hit by security fears

    01/09/2008 5:17:30 PM PST · by Aristotelian · 13 replies · 77+ views
    BBC News ^ | 9 January 2008 | Staff
    Boeing has been ordered to ensure passengers on its new 787 Dreamliner jet cannot hack into the flight system and take control of the plane. The ruling has come from America's Federal Aviation Administration (FAA), which is concerned that the plane's computer system may be vulnerable. Boeing said it was in constant dialogue with the FAA to resolve the issue. The US giant will start to deliver the mid-sized planes from November. British Airways has ordered 24 Dreamliners. Rival UK carrier Virgin Atlantic has orders for 15.
  • Christian website hacked (crosswalk.com)

    12/31/2007 1:14:10 PM PST · by CardCarryingMember.VastRightWC · 15 replies · 200+ views
    Crosswalk.com ^ | 12/31/2007 | Self
    This site has been hacked for at least an hour now, apparently by an illiterate, anti-Christian, teenaged hacker from Finland. I traced down the domain owners and called their North Carolina phone #. They are in today, and know about the hacking, and are trying to fix it at the moment.
  • Enemies at The Firewall[Chinese Hackers]

    12/14/2007 10:54:19 AM PST · by BGHater · 3 replies · 43+ views
    Time ^ | 06 Dec 2007 | Simon Elegant
    Tan Dailin lets out an audible gasp when he is told that he was identified in the U.S. as someone who may have been responsible for recent security breaches at the Pentagon. "Will the FBI send special agents out to arrest me?" he asks. Much as they might want to talk with him, though, FBI agents don't have jurisdiction in Chengdu, the capital of China's Sichuan province, where Tan lives. And given that he has been lauded in China's official press for his triumphs in military-sponsored hacking competitions, Tan is unlikely to have problems with local law enforcement. But Tan...
  • Amazing XP Tools to Arm your PC from Hackers

    12/01/2007 7:35:47 AM PST · by george76 · 106 replies · 633+ views
    Tech Dune ^ | oct 9 | Tech Dune
    Hackers have newer methods to hack into your systems. They are smart enough to detect security loop holes in your PC and enter through open ports,unencrypted Wi-Fi connections,malicious websites or internet servers. It is better you check your PC periodically for invasions and protect your system to prevent pilfering and damage of data. Detecting security loopholes. Eliminating malicious programs. Tracking hackers .