Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $7,814
9%  
Woo hoo!! 3rd Qtr 2025 FReepathon is now underway!!

Keyword: hackers

Brevity: Headers | « Text »
  • Dirty Tricks - Palin E-mail Hacked Associated Press Won't Cooperate

    09/17/2008 10:30:35 PM PDT · by GVnana · 57 replies · 417+ views
    AP ^ | 9/17/2008 | Ted Bridis
    Hackers break into Sarah Palin's e-mail account Sep 17 09:11 PM US/Eastern By TED BRIDIS Associated Press Writer Hackers Break Into Palin’s E-Mail Account & Post Messages, Pictures Online WASHINGTON (AP) - Hackers broke into the Yahoo! e-mail account that Republican vice presidential candidate Sarah Palin used for official business as Alaska's governor, revealing as evidence a few inconsequential personal messages she has received since John McCain selected her as his running mate.
  • Hackers break into Sarah Palin's e-mail account

    09/17/2008 10:30:30 PM PDT · by CurlyDave · 14 replies · 243+ views
    MyWay ^ | Sept 17, 2008 | Ted Bridis
    WASHINGTON (AP) - Hackers broke into the Yahoo! e-mail account that Republican vice presidential candidate Sarah Palin used for official business as Alaska's governor, revealing as evidence a few inconsequential personal messages she has received since John McCain selected her as his running mate... The Secret Service contacted The Associated Press on Wednesday and asked for copies of the leaked e-mails, which circulated widely on the Internet. The AP did not comply....
  • Memo to US Secret Service: Net proxy may pinpoint Palin email hackers

    09/17/2008 8:34:16 PM PDT · by Islander7 · 60 replies · 417+ views
    The Register ^ | Sept 18, 2008 | By Dan Goodin
    Memo to law enforcement investigators tracking down who broke into Sarah Palin's Yahoo email account: Gabriel Ramuglia might be a good place to start. The 25-year-old webmaster and entrepreneur is the operator of Ctunnel.com, the browsing proxy service used by the group that hacked into the vice presidential candidate's personal email account and exposed its contents to the world. While he has yet to examine his logs, he says there's a good chance they will lead to those responsible, thanks to some carelessness on their part. "Usually, this sort of thing would be hard to track down because it's Yahoo...
  • McCain Camp Seeks Investigation Over Reported E-Mail Hack (FBI, Secret Service Involved)

    09/17/2008 2:56:32 PM PDT · by kristinn · 95 replies · 439+ views
    CNN ^ | Wednesday, September 17, 2008 | Carol Cratty and Kevin Bohn
    John McCain's campaign said Wednesday it has contacted "appropriate authorities" over a report that Republican VP candidate Sarah Palin's personal e-mail had been hacked. "This is a shocking invasion of the Governor's privacy and a violation of law," campaign manager Rick Davis said in a statement. "The matter has been turned over to the appropriate authorities and we hope that anyone in possession of these emails will destroy them. We will have no further comment." The statement came hours after a user on the Web site WikiLeaks said he had gained access to Palin's Yahoo e-mail account and gained access....
  • The story behind the Palin e-mail hacking (Uncovered: who was responsible-graphic language warning)

    09/17/2008 5:06:57 PM PDT · by Free ThinkerNY · 116 replies · 1,804+ views
    michellemalkin.com ^ | September 17, 2008 | Michelle Malkin
    This afternoon, I mentioned an infamous group of hackers whose Internet bulletin board was the gathering place for those who bragged about and publicized the Sarah Palin private e-mail hacking. A tech-savvy reader who monitors the hackers’ site e-mailed me a detailed explanation of how it went down, who was responsible, and how someone with a conscience warned a friend of the Palin family of the crime (language warning):
  • Michelle Malkin: Sarah Palin’s private e-mail hacked, family photos raided

    09/17/2008 1:47:32 PM PDT · by AUJenn · 71 replies · 533+ views
    http://michellemalkin.com/2008/09/17/sarah-palins-private-e-mail-hacked-family-photos-raided/
    Sometime early this morning, between approximately 3:00am - 4:00am, members of an infamous group of hackers broke into Gov. Sarah Palin’s private Yahoo e-mail account. The incriminating discussion threads included screenshots of Palin’s e-mail and private e-mail addresses of her contacts. The threads have since been deleted. Hacking e-mail is a federal crime. A TV anchor who broke into his colleague’s e-mail account recently pleaded guilty and faces a maximum five years in prison. The law will catch up to the hackers, but what about the lowlifes who are now gleefully splashing the alleged contents of Palin’s private e-mail account...
  • Sarah Palin’s private e-mail hacked, family photos raided; cesspool blog gloats

    09/17/2008 2:06:21 PM PDT · by GVnana · 78 replies · 700+ views
    Michelle Malkin Blog ^ | 9/17/2008 | Michelle Malkin
    Scroll for updates…Wired News confirms… Sometime early this morning, between approximately 3:00am - 4:00am, members of an infamous group of hackers broke into Gov. Sarah Palin’s private Yahoo e-mail account. The incriminating discussion threads included screenshots of Palin’s e-mail and private e-mail addresses of her contacts. The threads have since been deleted. Hacking e-mail is a federal crime. A TV anchor who broke into his colleague’s e-mail account recently pleaded guilty and faces a maximum five years in prison. The law will catch up to the hackers, but what about the lowlifes who are now gleefully splashing the alleged contents...
  • Sarah Palin’s private e-mail hacked, family photos raided; cesspool blog gloats

    09/17/2008 2:00:41 PM PDT · by pissant · 24 replies · 228+ views
    MichelleMalkin.com ^ | 9/17/08 | Michelle Malkin
    Scroll for updates…Wired News confirms… Sometime early this morning, between approximately 3:00am - 4:00am, members of an infamous group of hackers broke into Gov. Sarah Palin’s private Yahoo e-mail account. The incriminating discussion threads included screenshots of Palin’s e-mail and private e-mail addresses of her contacts. The threads have since been deleted. Hacking e-mail is a federal crime. A TV anchor who broke into his colleague’s e-mail account recently pleaded guilty and faces a maximum five years in prison. The law will catch up to the hackers, but what about the lowlifes who are now gleefully splashing the alleged contents...
  • JimRob & John Robinson - GET YOUR ACT TOGETHER - or the Nut Roots will take down Free Republic

    09/17/2008 10:28:43 AM PDT · by KayEyeDoubleDee · 354 replies · 1,787+ views
    <p>Chicago radio station WGN-AM is again coming under attack from the presidential campaign of Sen. Barack Obama for offering airtime to a controversial author. It is the second time in recent weeks the station has been the target of an "Obama Action Wire" alert to supporters of the Illinois Democrat.</p>
  • Hackers block Qaeda’s 9/11 terror on tape

    09/15/2008 2:18:03 PM PDT · by Dawnsblood · 35 replies · 2,652+ views
    The Hindustan Times ^ | 9/13/08 | Pramit Pal Chaudhuri
    Hackers prevented Al Qaeda from releasing a videotape to mark the seventh anniversary of 9/11. Al Qaeda has traditionally issued a video or audiotape by either Osama bin Laden or Ayman al Zawahiri, the terror network’s two leaders, to mark their massive terrorist attack on the US. As-Sahab, Al Qaeda’s media unit, had indicated earlier this week that it would post such a videotape on September 11. As-Sahab had banner images on the internet showing a silhouetted head with a question mark and the words, “Wait 11 September”. The US-based intelligence group IntelCenter had speculated the video would be a...
  • Hackers infiltrate Large Hadron Collider systems and mock IT security

    09/12/2008 11:14:42 AM PDT · by LibWhacker · 26 replies · 176+ views
    Telegraph ^ | 9/12/08 | Roger Highfield
    Hackers have mounted an attack on the Large Hadron Collider, raising concerns about the security of the biggest experiment in the world.As the first particles were circulating in the machine near Geneva where the world wide web was born, a Greek group hacked into the facility, posting a warning about weaknesses in its infrastructure. Calling themselves the Greek Security Team, the interlopers mocked the IT used on the project, describing the technicians responsible for security as "a bunch of schoolkids."
  • Threat Matrix: August 2008

    08/01/2008 12:17:04 PM PDT · by nwctwx · 1,066 replies · 8,561+ views
    Pentagon Makes Fighting Extremism Top Priority Seven years after the Sept. 11 attacks, the Pentagon on Thursday officially named "the long war" against global extremism as its top priority and pledged to avert any conventional military threat from China or Russia through dialogue. The Defense Department, in a new national defense strategy, also emphasized the need to subordinate military operations to "soft power" initiatives to undermine Islamist militancy by promoting economic, political and social development in vulnerable corners of the world. Defense Secretary Robert Gates said he hoped the change would help establish permanent institutional support for counterinsurgency skills...
  • Eight million people at risk of ID fraud after credit card details are stolen by hotel chain hackers

    08/25/2008 3:07:41 PM PDT · by xcamel · 22 replies · 256+ views
    (UK)mail online ^ | 1:21 PM on 25th August 2008 | Daniel Bates
    Up to eight million people are at risk of ID fraud after a hacker breached the security system of the world's largest hotel chain. An Indian hacker broke into the IT system of Best Western Hotel Group and stole personal details of everyone who has stayed there in the past 12 months. The details, which included home addresses, phone numbers, place of employment and credit card details, were sold on through an underground network controlled by the Russian Mafia.
  • The New E-spionage Threat (CHINA)

    04/14/2008 4:34:47 AM PDT · by Perseverando · 11 replies · 257+ views
    BusinessWeek Magazine ^ | April 10, 2008 | Brian Grow, Keith Epstein and Chi-Chu Tschang
    A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovers startling security gaps The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of computer code known as "Poison Ivy" designed to suck sensitive data out of the $4 billion consulting firm's computer network. The Pentagon hadn't sent the e-mail at all. Its origin is unknown, but the...
  • Fake VP announcements sent…even to White House press

    08/22/2008 2:15:20 PM PDT · by melt · 19 replies · 190+ views
    CNN Political Ticker ^ | 8/22/08 | Alexander Mooney
    (CNN) – Eager VP-watchers waiting for the text message announcement of Barack Obama’s choice of running mate have gotten their answer: It’s Hillary Clinton. And Tim Kaine. And Kathleen Sebelius. Since declaring the Democratic vice presidential pick would first be announced over e-mail and text message, several hoax announcements of the Illinois senator's choice have circulated, purporting to be from the Obama campaign. The latest came in e-mail Friday morning that hit the inboxes of many White House reporters, carrying the subject, "My Vice President."
  • Caucasus foes fight cyber war ( Russia and Georgia exchange.....)

    08/14/2008 9:20:57 AM PDT · by Ernest_at_the_Beach · 4 replies · 158+ views
    BBC ^ | Thursday, 14 August 2008 08:11 UK 07:11 GMT, | Neil Arun
    By Neil Arun BBC News Underpaid post-Soviet youths became notorious hackers, analysts say Armed with computers, unseen ranks of hackers are fanning conflict in the Caucasus.Internet users in Russia and Georgia have attacked vital websites in each other's countries, in a virtual echo of battles being fought on the ground by troops and tanks. Several Georgian government portals have been defaced or forced offline by hackers allegedly based in Russia. Visitors to Georgian President Mikhail Saakashvili's website were recently routed to a page portraying him as a modern-day Hitler. Georgia's parliament and foreign ministry sites have also repeatedly been...
  • US judge gags subway card hackers

    08/11/2008 1:30:03 PM PDT · by decimon · 17 replies · 105+ views
    AFP ^ | Aug 9, 2008 | Glenn Chapman
    LAS VEGAS, Nevada (AFP) - A US judge on Saturday gagged hackers from telling peers at a notorious DefCon conference how to get free rides by cracking commonly used subway "smart cards." The decision was immediately condemned by Internet rights attorneys that decried it as an attack on free speech that endangers the existence of computer security gatherings such as DefCon and Black Hat.
  • Cracking high-security locks is child's play: experts

    08/11/2008 5:58:48 AM PDT · by decimon · 8 replies · 99+ views
    AFP ^ | Aug 10, 2008 | Unknown
    LAS VEGAS, Nevada (AFP) - Security specialists on Sunday showed that cracking top-rated locks said to secure the US Pentagon and Britain's royal family is child's play. Marc Tobias was in a sea of hackers practicing lock picking at a DefCon gathering in Las Vegas when he easily opened Medeco's flagship lock with a paper clip and a key cut from plastic sheets in a Shrinky Dinks toy. "We think this is a pretty serious threat, and the government guys here we've been talking to agree," Tobias told AFP.
  • Apple disses hackers' Black Hat convention

    08/05/2008 8:38:22 PM PDT · by Swordmaker · 31 replies · 237+ views
    Scientific American ^ | 08/05/2008 | Larry Greenemeier
    In a move that could backfire, according to one security expert, Apple pulled out of a prominent hackers' convention taking place this week in Las Vegas. Apple abruptly canceled what would have been its first appearance at Black Hat, an annual event in Las Vegas that features presentations from the world's most preeminent security researchers – a.k.a. hackers – according to Computerworld. Speakers typically highlight security shortcomings in a number of different technologies, including operating systems, e-mail and the Internet itself. Taking one's lumps at Black Hat is a right of passage in a technology's security evolution, as companies like...
  • This Bug Man Is a Pest

    08/04/2008 1:11:43 PM PDT · by LibWhacker · 5 replies · 164+ views
    Newsweek ^ | 8/2/08 | Adam B. Kushner
    George Ledin teaches students how to write viruses, and it makes computer-security software firms sick.In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers. And Thomas Fynan floods a bulletin board with huge messages from fake users. Yet Joy and Fynan aren't hackers—they're students in a computer-security class at Sonoma State University. And their professor, George Ledin, has showed them how to penetrate even the best antivirus...