Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $31,423
38%  
Woo hoo!! And now only $167 to reach 39%!! Thank you all very much!! God bless.

Keyword: hackers

Brevity: Headers | « Text »
  • FBI Fears Chinese Hackers Have Back Door Into US Government & Military

    04/25/2008 4:16:12 AM PDT · by southlake_hoosier · 18 replies · 240+ views
    www.abovetopsecret.com ^ | 4-21-2008 | mister.old.school
    Some months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government security and IT infrastructure. The very-real concern, being investigated by the FBI, is that either the Chinese government or Chinese hackers (or both) have had the benefit of undetectable back-doors into highly secure government and military computer networks for months, perhaps years. The cause: a high-number of counterfeit Cisco routers and switches installed in nearly all government networks that experienced upgrades and/or new units within the past 18 months.
  • Why Democrats Rule the Web

    04/18/2008 10:05:34 AM PDT · by The_Republican · 25 replies · 107+ views
    Time.Com ^ | April 18th, 2008 | MICHAEL SCHERER, JAY NEWTON-SMALL
    "People were just getting together on their own," remembers Tom. "I guess you could call it grass roots." Like thousands of others, Tom downloaded phone lists so he could cold-call potential supporters in the area. Mary spent hours typing names and addresses into Obama's national database. The first paid operatives finally arrived in the area weeks later, only to find a virtually organized Obama machine already up and running. When the campaign held its first statewide training sessions in March, some 2,000 people turned up.It has gone on like this all year for Obama as his campaign deftly exploits the...
  • Breaking: blog which exposed the Hamdania/Haditha incident is hacked

    04/16/2008 8:38:48 PM PDT · by RaceBannon · 72 replies · 507+ views
    http://euphoricreality.com/ | 04/16/2008 | RaceBannon
    The site of Freeper EUPHORIADEV was hacked. She has lost over 2 years worth of data. Euphoriadev was covering the Haditha and Hamdania incident extensively she has lost over 2 years worth of data we do NOT believe it is the people who are claiming the hack
  • Hackers attack Christians, promise punishment

    04/12/2008 4:40:39 AM PDT · by Man50D · 22 replies · 115+ views
    WorldNetDaily.com ^ | April 11, 2008
    Staff members for a prominent pro-family organization that has been key to the battle against California's mandated homosexual indoctrination programs for public schools are working off-site while an investigation is conducted into threats that someone would arrive at the office and "punish" them, officials confirmed today. The investigation into the threats follows several days of aggressive attacks on the website for Capitol Resource Family Impact, which has restored the site multiple times, only to see another hacker attack disable the location. Karen England, chief of the organization that has played a prominent role in a challenge to the implementation of...
  • The No-Tech Hacker

    04/09/2008 5:08:48 PM PDT · by 2ndDivisionVet · 32 replies · 83+ views
    Forbes ^ | February 29, 2008 | Andy Greenberg
    Hackers have a lot of fancy names for the technical exploits they use to gain access to a company's networks: cross-site scripting, buffer overflows or the particularly evil-sounding SQL injection, to name a few. But Johnny Long prefers a simpler entry point for data theft: the emergency exit door. "By law, employees have to be able to leave a building without showing credentials," Long says. "So the way out is often the easiest way in." Case in point: Tasked with stealing data from an ultra-secure building outfitted with proximity card readers, Long opted for an old-fashioned approach. Instead of looking...
  • Hackers Assault Epilepsy Patients Via Computer

    03/31/2008 6:17:58 PM PDT · by rmlew · 28 replies · 2,033+ views
    Anand Tech ^ | March 31, 2008 | Jason Mick
    Internet troublemakers, known as griefers, conducted an organized hack attack against an epilepsy support message board last weekend.  The attack, designed to inflict bodily injury, is the first known example of a large scale hack designed to inflict physical damage on the victims.  The attackers used injected JavaScript to trigger flashing images on the computers of their victims, causing them severe migraines and seizures. The site is run and maintained by a nonprofit organization, the Epilepsy Foundation.  Its goal is to provide a place where epileptics and family members can provide each other with support.  The group had to close...
  • Harvard student database hacked, posted on BitTorrent

    03/14/2008 2:01:03 AM PDT · by TigerLikesRooster · 10 replies · 817+ views
    ZDNet Asia ^ | 03/14/08 | Robert Vamosi
    Harvard student database hacked, posted on BitTorrent By Robert Vamosi, CNET News.com Friday, March 14, 2008 12:03 PM Harvard University says about 10,000 of last year's applicants may have had their personal information compromised. At least 6,600 Social Security numbers were exposed. Worse, a compressed 125 M-byte file containing the stolen student data is currently available via BitTorrent, a peer-to-peer network. In a statement published Monday night Harvard officials said the database containing summaries of GSAS applicant data for entry to the Fall 2007 academic year, summaries of GSAS housing applicant data for the 2007-08 and 2006-07 academic years, and...
  • Hackers launch massive IFrame attack

    03/13/2008 2:45:38 PM PDT · by JerseyHighlander · 48 replies · 1,937+ views
    ComputerWorld.com ^ | March 13, 2008 | Gregg Keizer
    Hackers launch massive IFrame attack Gregg Keizer March 13, 2008 (Computerworld) Hackers using a new scam continue to subvert hundreds of thousands of Web pages with IFrame redirects that send unwary users to malware-spewing sites, researchers said today. The attacks, which began about a week ago, show no signs of slowing, said Dancho Danchev in a posting to his blog yesterday. "The group is continuing to expand the campaign," said the Bulgarian researcher. "These are the high-profile sites targeted by the same group within the past 48 hours, with the number of locally cached and IFrame-injected pages within their search...
  • Security Card Chip Can Be Hacked

    03/12/2008 4:00:45 PM PDT · by kiriath_jearim · 5 replies · 203+ views
    Breitbart ^ | 3/12/08 | TOBY STERLING
    AMSTERDAM, Netherlands (AP) - The Dutch interior affairs minister says a technology being used in up to a billion security cards around the world can easily be hacked. The "Mifare" chip technology owned and licensed by NXP Semiconductors is frequently used in public transport systems such as London's "Oyster" card. It is also used by corporations and governments in "swipe" access cards. Guusje ter Horst said Wednesday that researchers at the Radboud University in Nijmegen have "developed a method by which a large number of (Mifare) chip-cards is relatively easy to crack and duplicate." Ter Horst wrote in a letter...
  • Al-Qaeda recruiting geeks to run multimedia operation

    03/08/2008 11:59:10 AM PST · by 2ndDivisionVet · 12 replies · 620+ views
    The Taipei Times ^ | March 9, 2008 | Kathy Gannon
    One expert said some productions made by the terror group were 'good enough to put on the Discovery Channel' PESHAWAR, PAKISTAN In an Internet age, al-Qaeda prizes geek jihadis as much as would-be suicide bombers and gunmen. The terror network is recruiting computer-savvy technicians to produce sophisticated Web documentaries and multimedia products aimed at Muslim audiences in the US, Britain and other Western countries. Already, the terror movement's al-Sahab production company is turning out high quality material, some of which rivals productions by Western media companies. The documentaries appear regularly on Islamist Web sites, which al-Qaeda uses to recruit followers...
  • Chinese cyberattacks on experts

    03/07/2008 7:47:26 AM PST · by BGHater · 9 replies · 279+ views
    UPI ^ | 06 Mar 2008 | SHAUN WATERMAN
    Defense-related think tanks and contractors, as well as the Pentagon and other U.S. agencies, were the target of repeated computer network intrusions last year apparently originating in China, the Department of Defense said this week. In its annual report to lawmakers on China's military power, the department said the intrusions "appeared to originate in" China but added, "It is unclear if these intrusions were conducted by, or with the endorsement of" the Chinese government or military. The report gave few details, but one China expert who works in the private sector told United Press International that in the last 18...
  • (Skeptical) Global Warming Site Shutdown by Hackers (AGW Denial-of-Service Attack)

    03/01/2008 9:53:55 AM PST · by Robert A Cook PE · 20 replies · 459+ views
    CO2 Science ^ | Mar 01 2008 | Robert A Cook
    CO2 Science is an excellent reference source for hundreds of global warming and CO2 research studies debunking the media's AGW hysterical outbursts. They clearly show their 25% increase in plant production due to today's higher CO2 levels, the high temperatures common across the world during the Chinese, Roman, and Medieval Warm Period, plus the cold intervals of the Dark Age of 450-700 AD, Little Ice in 1600 AD. Well, it looks like CO2 Science paid the price for opposing today's international socialist agenda to ruin America's economy: Their web site was shutdown by a denial-of-service attack, and they are only...
  • Foreign hackers seek to steal Americans' health records

    02/20/2008 5:56:36 PM PST · by BGHater · 19 replies · 132+ views
    Federal Computer Week ^ | 17 Feb 2008 | Nancy Ferris
    Foreign hackers, primarily from Russia and China, are increasingly seeking to steal Americans’ health care records, according to a Department of Homeland Security analyst. Mark Walker, who works in DHS’ Critical Infrastructure Protection Division, told a workshop audience at the National Institute of Standards and Technology that the hackers’ primary motive seems to be espionage. “They’ve been focused on the [Department of Defense] – the military – but now are spreading out into the health care private sector,” Walker said. Early in 2007, a virus was placed on a Centers for Disease Control and Prevention Web site, he said, and...
  • Chinese hackers target government

    02/10/2008 9:45:26 AM PST · by milestogo · 3 replies · 50+ views
    Chinese hackers target government CHINESE computer hackers have launched targeted attacks on classified Australian government computer networks. The cyber attacks has prompted an internal review of IT security, Fairfax newspapers report. The federal government will spend $70 million to improve IT security this year, a figure that could be increased after the recent spate of hackings. The attacks are thought to be part of an international espionage operation to glean intelligence from the western world. Australian intelligence figures are believed to be concerned at a growing level of industrial espionage. The attacks late last year are believed to have been...
  • Hackers break into Internet service at RIT (Rochester N.Y.)

    02/07/2008 9:15:45 AM PST · by Sammy67 · 3 replies · 64+ views
    According to RIT officials, at approximately 5:45 a.m. Wednesday, RIT lost Internet connection for about 90 minutes. During that time, all in-bound Internet traffic was being diverted by hackers to an overseas location. RIT officials believe that hackers in the Indonesia and Korea area tried to take advantage of the RIT
  • 300 ~ Persian Recut - The Truth!

    02/02/2008 6:25:06 PM PST · by freedom44 · 55 replies · 732+ views
    YouTube ^ | 2/3/08 | Youtube
    The Spartans worshipped many Gods. The Persians only one - Ahura Mazda. Zoroastranism a faith which led to Judaism, Christianity and Islam. The Spartans despised democracy. They fought for generations against the Athenians because of their devout hatred towards the concept. The Persians allowed democratic reign, freedom for Satrips and anyone within the empire. Cyrus the Great the founder of the Persian Empire is mentioned 23 times in the Bible and is the only figure dubbed the 'anointed' Cyrus is mentioned some 23 times in the literature of the Old Testament. Isaiah refers to Cyrus as Jehovah’s “shepherd,” the Lord’s...
  • Bush Order Expands Computer Network Monitoring

    01/26/2008 6:28:48 AM PST · by Sammy67 · 4 replies · 30+ views
    Emergency.com ^ | 1/24/08
    Bush Order Expands Network Monitoring Intelligence Agencies to Track Intrusions By Ellen Nakashima, Washington Post Staff Writer WASHINGTON, DC: President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems. The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored. Until now, the government's efforts to protect itself from cyber-attacks -- which run the gamut from hackers to...
  • New Sophos Security Report reveals cybercriminals moving beyond Microsoft - to Macs

    01/22/2008 10:01:00 PM PST · by Swordmaker · 11 replies · 160+ views
    Sophos Press Release ^ | 22 January 2008
    Mac users targeted by financially-motivated hackers for the first timeIT security and control firm, Sophos, has published its Security Threat Report 2008 examining the threat landscape over the previous twelve months, and predicting emerging cybercrime trends for 2008. The report reveals that in 2007 organised criminal gangs for the first time arrived at Apple's doorstep with the intention of stealing money. With proof that hackers are extending their efforts beyond Windows, Sophos is warning computer users of all operating systems not to be complacent about security. Sophos experts note that malware for Macs has been seen before, but until recently,...
  • CIA Says Hackers Pulled Plug on Power Grid

    01/22/2008 7:05:45 PM PST · by lasereye · 9 replies · 126+ views
    Network World ^ | 1/19/08 | Robert McMillan
    Criminals have been able to hack into computer systems via the Internet and cut power to several cities, a U.S. Central Intelligence Agency analyst said this week. Speaking at a conference of security professionals on Wednesday, CIA analyst Tom Donahue disclosed the recently declassified attacks while offering few specifics on what actually went wrong. Criminals have launched online attacks that disrupted power equipment in several regions outside of the U.S., he said, without identifying the countries affected. The goal of the attacks was extortion, he said. "We have information, from multiple regions outside the United States, of cyber intrusions into...
  • CIA Says Hackers Have Cut Power Grid (outside the US)

    01/19/2008 8:29:48 AM PST · by STARWISE · 29 replies · 664+ views
    PC World ^ | 1-19-08 | Robert McMillan, IDG News Service
    Several cities outside the U.S. have sustained attacks on utility systems and extortion demands. Criminals have been able to hack into computer systems via the Internet and cut power to several cities, a U.S. Central Intelligence Agency analyst said this week. Speaking at a conference of security professionals on Wednesday, CIA analyst Tom Donahue disclosed the recently declassified attacks while offering few specifics on what actually went wrong. Criminals have launched online attacks that disrupted power equipment in several regions outside of the U.S., he said, without identifying the countries affected. The goal of the attacks was extortion, he said....