Keyword: hackers
-
Scroll for updates…Wired News confirms… Sometime early this morning, between approximately 3:00am - 4:00am, members of an infamous group of hackers broke into Gov. Sarah Palin’s private Yahoo e-mail account. The incriminating discussion threads included screenshots of Palin’s e-mail and private e-mail addresses of her contacts. The threads have since been deleted. Hacking e-mail is a federal crime. A TV anchor who broke into his colleague’s e-mail account recently pleaded guilty and faces a maximum five years in prison. The law will catch up to the hackers, but what about the lowlifes who are now gleefully splashing the alleged contents...
-
Scroll for updates…Wired News confirms… Sometime early this morning, between approximately 3:00am - 4:00am, members of an infamous group of hackers broke into Gov. Sarah Palin’s private Yahoo e-mail account. The incriminating discussion threads included screenshots of Palin’s e-mail and private e-mail addresses of her contacts. The threads have since been deleted. Hacking e-mail is a federal crime. A TV anchor who broke into his colleague’s e-mail account recently pleaded guilty and faces a maximum five years in prison. The law will catch up to the hackers, but what about the lowlifes who are now gleefully splashing the alleged contents...
-
<p>Chicago radio station WGN-AM is again coming under attack from the presidential campaign of Sen. Barack Obama for offering airtime to a controversial author. It is the second time in recent weeks the station has been the target of an "Obama Action Wire" alert to supporters of the Illinois Democrat.</p>
-
Hackers prevented Al Qaeda from releasing a videotape to mark the seventh anniversary of 9/11. Al Qaeda has traditionally issued a video or audiotape by either Osama bin Laden or Ayman al Zawahiri, the terror network’s two leaders, to mark their massive terrorist attack on the US. As-Sahab, Al Qaeda’s media unit, had indicated earlier this week that it would post such a videotape on September 11. As-Sahab had banner images on the internet showing a silhouetted head with a question mark and the words, “Wait 11 September”. The US-based intelligence group IntelCenter had speculated the video would be a...
-
Hackers have mounted an attack on the Large Hadron Collider, raising concerns about the security of the biggest experiment in the world.As the first particles were circulating in the machine near Geneva where the world wide web was born, a Greek group hacked into the facility, posting a warning about weaknesses in its infrastructure. Calling themselves the Greek Security Team, the interlopers mocked the IT used on the project, describing the technicians responsible for security as "a bunch of schoolkids."
-
Pentagon Makes Fighting Extremism Top Priority Seven years after the Sept. 11 attacks, the Pentagon on Thursday officially named "the long war" against global extremism as its top priority and pledged to avert any conventional military threat from China or Russia through dialogue. The Defense Department, in a new national defense strategy, also emphasized the need to subordinate military operations to "soft power" initiatives to undermine Islamist militancy by promoting economic, political and social development in vulnerable corners of the world. Defense Secretary Robert Gates said he hoped the change would help establish permanent institutional support for counterinsurgency skills...
-
Up to eight million people are at risk of ID fraud after a hacker breached the security system of the world's largest hotel chain. An Indian hacker broke into the IT system of Best Western Hotel Group and stole personal details of everyone who has stayed there in the past 12 months. The details, which included home addresses, phone numbers, place of employment and credit card details, were sold on through an underground network controlled by the Russian Mafia.
-
A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovers startling security gaps The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of computer code known as "Poison Ivy" designed to suck sensitive data out of the $4 billion consulting firm's computer network. The Pentagon hadn't sent the e-mail at all. Its origin is unknown, but the...
-
(CNN) – Eager VP-watchers waiting for the text message announcement of Barack Obama’s choice of running mate have gotten their answer: It’s Hillary Clinton. And Tim Kaine. And Kathleen Sebelius. Since declaring the Democratic vice presidential pick would first be announced over e-mail and text message, several hoax announcements of the Illinois senator's choice have circulated, purporting to be from the Obama campaign. The latest came in e-mail Friday morning that hit the inboxes of many White House reporters, carrying the subject, "My Vice President."
-
By Neil Arun BBC News Underpaid post-Soviet youths became notorious hackers, analysts say Armed with computers, unseen ranks of hackers are fanning conflict in the Caucasus.Internet users in Russia and Georgia have attacked vital websites in each other's countries, in a virtual echo of battles being fought on the ground by troops and tanks. Several Georgian government portals have been defaced or forced offline by hackers allegedly based in Russia. Visitors to Georgian President Mikhail Saakashvili's website were recently routed to a page portraying him as a modern-day Hitler. Georgia's parliament and foreign ministry sites have also repeatedly been...
-
LAS VEGAS, Nevada (AFP) - A US judge on Saturday gagged hackers from telling peers at a notorious DefCon conference how to get free rides by cracking commonly used subway "smart cards." The decision was immediately condemned by Internet rights attorneys that decried it as an attack on free speech that endangers the existence of computer security gatherings such as DefCon and Black Hat.
-
LAS VEGAS, Nevada (AFP) - Security specialists on Sunday showed that cracking top-rated locks said to secure the US Pentagon and Britain's royal family is child's play. Marc Tobias was in a sea of hackers practicing lock picking at a DefCon gathering in Las Vegas when he easily opened Medeco's flagship lock with a paper clip and a key cut from plastic sheets in a Shrinky Dinks toy. "We think this is a pretty serious threat, and the government guys here we've been talking to agree," Tobias told AFP.
-
In a move that could backfire, according to one security expert, Apple pulled out of a prominent hackers' convention taking place this week in Las Vegas. Apple abruptly canceled what would have been its first appearance at Black Hat, an annual event in Las Vegas that features presentations from the world's most preeminent security researchers – a.k.a. hackers – according to Computerworld. Speakers typically highlight security shortcomings in a number of different technologies, including operating systems, e-mail and the Internet itself. Taking one's lumps at Black Hat is a right of passage in a technology's security evolution, as companies like...
-
George Ledin teaches students how to write viruses, and it makes computer-security software firms sick.In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers. And Thomas Fynan floods a bulletin board with huge messages from fake users. Yet Joy and Fynan aren't hackers—they're students in a computer-security class at Sonoma State University. And their professor, George Ledin, has showed them how to penetrate even the best antivirus...
-
A London man accused of hacking into the computer systems of the US military and NASA on Wednesday lost his appeal against extradition to face trial. Gary McKinnon, 42, tried to prevent his transfer to the United States to be tried over what has been described as the "biggest military hack of all time" by taking his case to Britain's highest court, the House of Lords. But five judges unanimously rejected the appeal, paving the way for the unemployed UFO enthusiast to be extradited to the US, where he could be jailed for up to 70 years if convicted of...
-
In November, I wrote that many Windows users who are switching to the Mac are doing so because they're fed up with viruses, spyware and other threats aimed at the platform. Many are victims of malware that often relies on social engineering to infect a system. They're enticed into taking some action that places malevolent code on their machines. In other words, these users' bad computing habits are a major cause of their own woes. These security-clueless folks, I wrote, are now bringing those bad habits to the Macintosh platform, and according to a new story on Times Online, the...
-
Hackers are deluging web users with malware-laden spam claiming that World War III has started following a US invasion of Iran. Security experts warned today that spam emails with subject lines including 'Third World War has begun', '20000 US Soldiers in Iran' and 'US Army crossed Iran's borders' have been intercepted. The emails contain links to a malicious webpage that displays what appears to be a video player showing the mushroom cloud of a nuclear explosion. Text on the page reads: 'Just now US Army's Delta Force and US Air Force have invaded Iran. 'Approximately 20000 soldiers crossed the border...
-
By going public last week about hack attacks by China on computers in his congressional office, Rep. Frank Wolf (R-VA) put the spotlight on a growing trend of cyber attacks on U.S. and foreign government officials. U.S. defense officials confirmed that Chinese military hackers had broken into computers at the Pentagon used for email within the office of Defense Secretary Robert Gates. Germany’s Chancellor Angela Merkel complained directly to Chinese President Hu Jintao about Chinese attacks on German government computers, and European and Asian governments from France and Britain to Japan and South Korea have identified widespread Chinese hacking. U.S....
-
County prosecutors allege Omar Khan, 18, of Coto de Caza, and Tanvir Singh, 18, of Ladera Ranch, broke into Tesoro High School in Las Flores to steal tests and change their own and others' grades on the school computer network.
-
A cyber-quest to improve grades resulted in a 17-page complaint and 69 felony counts against two California high school seniors probably not the type of paperwork that'll get them into the Ivy League. The scariest number of all is probably 38- the number of years alleged cyber-hacker Omar Shahid Khan, 18, could face behind bars if convicted on all 69 charges he faces tied to alleged break-ins at Tesoro High School in Las Flores, Calif. His friend, Tanvir Singh, also 18, could face up to three years for four felony counts. Their motive, according to prosecutors? To bulk up...
|
|
|