Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $6,140
7%  
Woo hoo!! 3rd Qtr 2025 FReepathon is now underway!!

Keyword: hackers

Brevity: Headers | « Text »
  • Twitter compromised by French hacker calling himself 'Hacker Croll'

    05/04/2009 5:21:15 AM PDT · by Schnucki · 3 replies · 606+ views
    News.com.au ^ | May 4, 2009
    A FRENCH computer hacker is thought to have tapped into Twitter's internal system, gaining access to millions of accounts including that of US President Barack Obama. The hacker, under the name "Hacker Croll", posted a series of screenshots showing him viewing internal website settings and the private details of user accounts. The screenshots show Croll looking at the behind-the-scenes details for the account of US President Barack Obama, including the IP address of the last person to use it. Twitter co-founder Biz Stone confirmed unauthorised access was gained by an outside party during the week, but said only 10 individual...
  • Two Missouri Brothers Among Those Indicted in $4 Million Nationwide Spamming Conspiracy

    04/29/2009 7:49:35 PM PDT · by Cindy · 9 replies · 635+ views
    Note: The following text is a quote: Two Missouri Brothers Among Those Indicted in $4 Million Nationwide Spamming Conspiracy Millions of E-Mail Addresses Illegally Harvested from Computers at 2,000 Schools KANSAS CITY, MO—Two Missouri men and their company are among those indicted by a federal grand jury in a nationwide e-mail spamming case that victimized more than 2,000 colleges and universities in a scheme that sold more than $4 million worth of products to students, announced Matt J. Whitworth, Acting United States Attorney for the Western District of Missouri. Amir Ahmad Shah, 28, of St. Louis., his brother, Osmaan Ahmad...
  • Hackers: The China Syndrome

    04/28/2009 10:39:37 AM PDT · by BGHater · 2 replies · 1,146+ views
    Popular Science ^ | 23 April 2009 | Mara Hvistendahl
    For years, the U.S. intelligence community worried that China’s government was attacking our cyber-infrastructure. Now one man has discovered it’s worse: It’s hundreds of thousands of everyday civilians. And they’ve only just begun At 8 a.m. on May 4, 2001, anyone trying to access the White House Web site got an error message. By noon, whitehouse.gov was down entirely, the victim of a so-called distributed denial-of-service (DDoS) attack. Somewhere in the world, hackers were pinging White House servers with thousands of page requests per second, clogging the site. Also attacked were sites for the U.S. Navy and various other federal...
  • THE CYBERSPY THREAT: FOREIGN HACKERS TARGET MILITARY

    04/27/2009 2:32:20 AM PDT · by Scanian · 5 replies · 882+ views
    NY Post ^ | April 27, 2009 | Peter Brookes
    AMERICA needs to pay a heckuva a lot more atten tion to the cyberthreat. Now. Sure, the Pentagon is refuting a Wall Street Journal report last week that hackers pinched loads of data on the military's newest, high-tech fighter aircraft from contractors' computer networks via the Internet. But even if the F-35 Joint Strike Fighter program wasn't actually penetrated by cyberspies, it's still a chilling wake-up call for the United States. The computer systems of the F-35 Lightning were penetrated "repeatedly," according to the newspaper, allowing cyber cat burglars to "copy and siphon off several terabytes of data related to...
  • Gates Presses to Boost Computer Network Security

    04/22/2009 3:29:26 PM PDT · by Cindy · 4 replies · 402+ views
    By Donna Miles American Forces Press Service WASHINGTON, April 22, 2009 – Defense Department officials are working to reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the foreseeable future, Defense Secretary Robert M. Gates said. “We are under attack virtually all the time, every day here,” Gates told CBS Evening News anchor Katie Couric yesterday during an interview broadcast on the show. Attempts to attack DoD computer networks have more than doubled recently, Pentagon spokesman Bryan Whitman told reporters yesterday. He declined to cite details, saying that to do so would only “make it...
  • Computer Spies Breach Fighter-Jet Project

    04/21/2009 5:15:56 AM PDT · by Pistolshot · 22 replies · 1,023+ views
    Wall Street Journal ^ | Tuesday, April 21, 2009 | Wall Street Journal
    WASHINGTON — Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever — according to current and former government officials familiar with the attacks. Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft. The latest intrusions provide new evidence that a battle is heating up...
  • Computer Spies Breach Fighter-Jet Project

    04/20/2009 10:16:52 PM PDT · by rdl6989 · 21 replies · 1,566+ views
    foxnews.com ^ | April 21, 2009
    WASHINGTON — Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever — according to current and former government officials familiar with the attacks. Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft. The latest intrusions provide new evidence that a battle is heating up...
  • Tila Tequila dead? No -- just a stalker's sick trick

    04/13/2009 7:42:56 AM PDT · by Perdogg · 37 replies · 7,216+ views
    Zap it ^ | 04.13.09
    This was going to be a "don't believe everything you read on Twitter" sort of post, but the reality involving a rumor that online celeb/MTV star Tila Tequila had died is a little scarier than that. It appears that a stalker broke into the "A Shot at Love" star's house early Monday and posted two messages to her Twitter account (which has some 79,000 followers). "Tila Tequila is dead," the first one read, followed a few minutes later by "I just broke into her house, killer her and her dog. Logged onto Twitter to tell you guys. She was signed...
  • Hoax Palm Beach County government Web site used by hackers, spammers

    04/13/2009 8:48:06 AM PDT · by prismsinc · 1 replies · 281+ views
    The Palm Beach Post ^ | 04-13-09 | Mathilde Piard
    The Sun-Sentinel has an article this morning about how a hackers are using a Web site that is posing as the Palm Beach County government Web site: Leaving out the first “.” in www.pbcgov.com lands unwitting visitors on a hoax site. Making the wrong move on that site could enable hackers and spammers to secretly take over a computer, using it to send viruses and mass e-mails without the owner knowing. Michael Butler, the county director of network services, says there’s a Trojan Horse for them to take over your machine. When you visit the hoax site, an official-looking message...
  • UPDATE 2-US concerned power grid vulnerable to cyber-attack

    04/09/2009 3:04:57 AM PDT · by shove_it · 14 replies · 679+ views
    Reuters ^ | 4/8/2009 | Felix Salmon and Randall Mikkelsen
    U.S. concerns about the potential for cyber-attacks on critical infrastructure extended to the American electrical power grid on Wednesday and experts pointed the finger anew at Chinese hackers, among others. As a result, electric utilities are likely to face new pressures from the U.S. Congress and government regulators to tighten security and preparations against computer intrusions that would wreak widespread havoc. U.S. Homeland Security Secretary Janet Napolitano told reporters the power grid is vulnerable to potentially disabling computer attacks, while declining to comment on reports that an intrusion had taken place. "The vulnerability is something that the Department of Homeland...
  • Cyber-Hackers Could Cripple US Power Grid Network ("What keeps your lights on...is old technology")

    04/08/2009 4:29:37 PM PDT · by fight_truth_decay · 32 replies · 887+ views
    TechNewsWorld ^ | 04/08/09 2:27 PM PT | By Jack M. Germain
    Foreign hackers have reportedly managed to break into the computer network controlling the nation's power grid. The discovery has raised alarm about how such unauthorized access could be used to harm the U.S., though the discovery may motivate actions to strengthen the security systems surrounding the nation's infrastructure. A Wall Street Journal report that foreign hackers have repeatedly penetrated the U.S. power grid computer network has delivered a loud wake-up call. Cyber-spies from countries including China and Russia have breached the electrical infrastructure's computer network and left software tools behind that would have allowed them to control or destroy infrastructure...
  • Chinese and Russian Hackers are Breaking into US Cyber System

    04/08/2009 11:26:00 AM PDT · by neverdem · 8 replies · 366+ views
    blog.taragana.com ^ | April 8th, 2009 | Soumya Sinha
    Chinese and Russian cyber spies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. According to Fox News, the spies are also from other countries, and they were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war. The espionage appeared pervasive across the U.S. and doesn't target a particular company or region, said...
  • Smart-grid hackers could cause blackouts

    03/22/2009 5:53:34 PM PDT · by BenLurkin · 11 replies · 805+ views
    cnet ^ | March 21, 2009 12:03 PM PDT | Zoë Slocum
    Deployments of smart grids should be slowed until security vulnerabilities are addressed, according to some cybersecurity experts, citing tests showing that a hacker can cause a major blackout after breaking into a smart-grid system. The idea behind smart grids, a burgeoning energy sector in which even Google is playing a role, is that automated meters and two-way power consumption data can be used to improve the efficiency and reliability of an electrical system's power distribution. A washing machine in a household hooked up to a smart meter, for instance, could be set up to run only at lower-cost, off-peak hours,...
  • New Mormon anti-freeper site and campaign to bankrupt FR

    03/29/2009 2:35:03 PM PDT · by Jim Robinson · 2,018 replies · 24,050+ views
    rumor mill | March 29, 2009 | Jim Robinson
    I understand there is a new anti-freeper site started by disgruntled former and present Mormon FReepers and it is their intention of bankrupting FR during the coming Freepathon by withholding their donations and disrupting our activities. Well, all I can say is, if they feel that badly against FR, by all means they should withhold their donations and drop out of FR. But it they attempt to disrupt our operations I will guarantee they will no longer be members of FR. If that is their wish, so be it. I'm not going to try to defend FR from their claims...
  • Chinese hack into Indian embassies, steal Dalai Lama's documents (worldwide Hack attack)

    03/28/2009 10:03:16 PM PDT · by Perdogg · 21 replies · 1,588+ views
    A China-based cyber spy network has hacked into government and private systems in 103 countries, including those of many Indian embassies and the Dalai Lama, an Internet research group said here Saturday. The Information Warfare Monitor (IWM), which carried out an extensive 10-month research on cyber spy activities emanating from China, said the hacked systems include the computers of Indian embassies and offices of the Dalai Lama.
  • Hacked File-Upload Accounts Prized by E-Jihadis

    03/28/2009 12:18:53 AM PDT · by nickcarraway · 4 replies · 504+ views
    The Washington Post ^ | 3/25/09 | Brian Krebs
    Hackers who sympathize with radical Islamic groups increasingly are using hijacked accounts at online file-upload and distribution services to disseminate large files, such as videos of attacks on Western forces in the Middle East, new research suggests. Services like RapidShare, Ziddu, and MegaUpload allow users to share large files, yet each places certain restrictions on non-paying users, such as limiting the number, speed, and size of files that free users can upload and download. But according to analysts at iDefense, a security intelligence firm owned by Verisign, hackers from various online jihadists forums have in recent months begun posting lengthy...
  • Virtual battleground attacks Hezbollah's soft underbelly

    03/25/2009 7:14:22 PM PDT · by forkinsocket · 1 replies · 316+ views
    Ha'aretz ^ | 24/03/2009 | Oded Yaron
    Last week, while trying out breaking-in tools developed by Chinese hackers, an Israeli Network security company, Applicure, brought down the Hezbollah Web site (hizbollah.tv), using no more than 10 bots, which are computers controlled by hackers. Reports of hackers taking out Web sites by bombarding them with massive amounts of information commonly appear in the news media. But often it's hard to estimate both the magnitude of the phenomenon and the ease with which even laymen can use existing web tools. Those attacks geared at bringing down Web sites are know as either denial of service attacks (DOS) or distributed...
  • Mac malware warning: new threat

    03/25/2009 9:41:58 AM PDT · by Swordmaker · 25 replies · 828+ views
    Web User - UK ^ | March 25, 2009
    Mac owners have been urged to be wary of a new threat that targets the Apple computer as well as Windows-based PCs. Researchers at security firm Sophos have discovered the OSX/RSPlug Trojan horse, which is being distributed on websites offering fake HDTV software. "Mac users are no different to Windows users when it comes to falling for social-engineering tricks like this - they are just as likely to install and run this program on their computer if they believe it will help them watch high-definition TV," said Graham Cluley of Sophos. Apple Mac malware: Caught on camera from Sophos Labs...
  • CHINA Chinese Hackers Target Senate Computers

    03/23/2009 2:40:44 PM PDT · by Cindy · 11 replies · 578+ views
    http://www.covertradioshow.com # The Daily Blast for March 23, 2009 PodCast Link: http://covertradioshow.com/podcast.cfm?pid=159 SNIPPET: “CHINA Chinese Hackers Target Senate Computers Cyber hackers believed to be based in China have tapped three times into the computer network in US Sen. Bill Nelson’s office, the Florida Democrat said Friday. Two attacks on the same day this month and another one last month targeted work stations used by three Nelson staffers — a key foreign-policy aide, the deputy legislative director and a former Nelson NASA advisor, according to Nelson’s staff.”
  • Florida senator says office computers were hacked

    03/21/2009 12:08:08 PM PDT · by prismsinc · 20 replies · 691+ views
    PalmBeachPost.com ^ | 03-21-09 | PalmBeachPost.com
    WASHINGTON — U.S. Sen. Bill Nelson says hackers breached the computer network in his Washington office, but didn't access any classified information.