Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $6,140
7%  
Woo hoo!! 3rd Qtr 2025 FReepathon is now underway!!

Keyword: hackers

Brevity: Headers | « Text »
  • Mac flaw could let hackers get scrambled data

    07/29/2009 5:27:16 PM PDT · by Swordmaker · 10 replies · 772+ views
    Reuters ^ | Wed Jul 29, 2009 6:13pm EDT | By Jim Finkle
    * Mac expert shows how hackers can steal encrypted data * Demonstrates method at conference for security experts LAS VEGAS, July 29 (Reuters) - A Mac security expert has uncovered a technique that hackers could use to take control of Apple Inc (AAPL.O) computers and steal data that is scrambled to protect it from identity thieves. Prominent Mac researcher Dino Dai Zovi disclosed the software flaw at the Black Hat security conference in Las Vegas, one of the world's top forums for exchanging information on Internet threats. About 4,000 security professionals are in attendance, including some who are really hackers....
  • Securing a Hacker-Free Zone on the Internet

    07/28/2009 1:30:48 PM PDT · by Cindy · 17 replies · 673+ views
    INFORMATION-SECURITY-RESOURCES.com ^ | July 27, 2009 | By Jacqueline Herships
    SNIPPET: "In theory at least, the Wild West days of Internet telecommunications are over. Based upon the inventions articulated in his five-patent suite, inventor Harry Emerson III, has mapped out a union between our secure and venerable telephone system - (Plain Old Telephone Service; a.k.a., POTS) - and the hyper-evolving, media-rich Internet which is so famously not one bit secure. As it evolves, he believes this next generation telecommunications system, dubbed IronPipe™, will have huge implications for national security as well as tremendous new revenue opportunities for the carriers and supply chains which serve them."
  • Cyber attacks in S. Korea launched from computers in 16 countries+

    07/09/2009 8:36:32 PM PDT · by Jet Jaguar · 10 replies · 548+ views
    Kyoto via Breitbart ^ | July 10, 2009 | N/A
    South Korea's state intelligence organization said Friday it has discovered that a wave of cyber attacks carried out earlier this week into key government and private websites in South Korea and the United States was launched from computers in 16 countries, Yonhap News Agency reported. The National Intelligence Service made the report to a closed-door meeting with members of a parliamentary intelligence committee, Yonhap quoted committee members as saying. North Korea was not among the 16 countries, which include South Korea, the United States, Japan, and Guatemala, Yonhap said. The cyber attacks have been traced to 86 Internet Protocol addresses...
  • White House among targets of sweeping cyber attack

    07/08/2009 8:20:33 AM PDT · by Jet Jaguar · 40 replies · 2,541+ views
    AP via Breitbart ^ | July 8, 2009 | LOLITA C. BALDOR
    The powerful attack that overwhelmed computers at U.S. and South Korean government agencies for days was even broader than initially realized, also targeting the White House, the Pentagon and the New York Stock Exchange. Other targets of the attack included the National Security Agency, Homeland Security Department, State Department, the Nasdaq stock market and The Washington Post, according to an early analysis of the malicious software used in the attacks. Many of the organizations appeared to successfully blunt the sustained computer assaults. The Associated Press obtained the target list from security experts analyzing the attacks. It was not immediately clear...
  • U.S. Government's Cyberdefense System Doesn't Work

    07/08/2009 8:39:11 AM PDT · by STARWISE · 17 replies · 527+ views
    Fox News/Wall Street Journal ^ | 7-8-09 | SIOBHAN GORMAN
    The flagship system designed to protect the U.S. government's computer networks from cyberspies is being stymied by technical limitations and privacy concerns, according to current and former national-security officials. The latest complete version of the system, known as Einstein, won't be fully installed for 18 months, according to current and former officials, seven years after it was first rolled out. This system doesn't protect networks from attack. It only raises the alarm after one has happened. A more capable version has sparked privacy alarms, which could delay its rollout. Since the National Security Agency acknowledged eavesdropping on phone and Internet...
  • Pro-Iranian regime hackers invade Oregon computers

    06/24/2009 6:36:05 PM PDT · by nuconvert · 9 replies · 841+ views
    PORTLAND, Ore. – Hackers defaced the home page of the Oregon University System, posting a caustic message telling President Barack Obama to mind his own business and stop talking about the disputed Iranian election. Attempts to access the university system's Web site were automatically redirected to another page, where readers viewed a message said to be from Iran that asserted there was no cheating in the election. That message was up for 90 minutes before university system technicians intervened Wednesday morning.
  • Hackers post anti-Obama message on Oregon University computer system

    06/24/2009 12:26:25 PM PDT · by Califreak · 31 replies · 1,272+ views
    Geek.com ^ | 6/24/09 | Tick Hodgin
    For 90 minutes this morning, hackers upset with President Obama’s vocal stance on the disputed Iranian election made their voice known. A message telling President Barack Obama to mind his own business and not to comment on Iran’s election was posted. A spokeswoman for the university, Diane Saunders, said hackers allegedly broke through the school’s computer defenses via a third-party software application that had not been properly updated. It afforded the hackers the ability to access the computer and address the president in the unflattering way: “Hey Stupid Fly Catcher Obama!”, according to the AP. Note: The phrase “Stupid Fly...
  • Computers hackers helping Iranian protesters

    06/22/2009 3:55:46 PM PDT · by fightin bronco · 40 replies · 1,182+ views
    Wall Street Journal ^ | 6/22/09 | Julie Steinberg
    Neda Soltani’s Death Inspires New Site A hastily created Web site called NedaNet has formed in honor of a young woman, Neda Soltani, who was killed during a Tehran protest. The site’s founder, Eric S. Raymond, created the page to serve as a jumping-off point for hackers who want to help Iranian citizens. “Our mission is to help the Iranian people by setting up networks of proxy servers, anonymizers and any other appropriate technologies that can enable them to communicate and organize — a network beyond the censorship or control of the Iranian regime,” the site says. A video widely...
  • FBI hacked by China ! (Stopped Arrest Of Terrorism Suspects!)

    06/20/2009 9:44:13 PM PDT · by MindBender26 · 25 replies · 1,847+ views
    Wash Times ^ | Bill Gertz
    A recent computer intrusion that forced the FBI to shut down its computer network and disrupted FBI operations was traced to an e-mail containing malicious code that originated in China, according to FBI officials. The forced shutdown of the network affected one significant FBI operation -- the May 20 arrest of homegrown terrorism suspects in New York, said officials who spoke on condition of anonymity because they were not authorized to discuss the matter. "The Chinese shut down our network," said one FBI official familiar with assessments of the attack.
  • International Telephone Hacking Conspiracy Busted (NJ)

    06/12/2009 2:52:24 PM PDT · by Larry381 · 7 replies · 588+ views
    Department of Justice ^ | June 12, 2009 | United States Attorney's Office District of New Jersey
    NEWARK, N.J.—An Indictment was unsealed today against three individuals who allegedly hacked into the telephone systems of large corporations and entities in the United States and abroad and sold information about the compromised telephone systems to Pakistani nationals residing in Italy, Acting U.S. Attorney Ralph J. Marra, Jr. announced. In conjunction with the unsealing of the Indictment, Italian law enforcement conducted searches of approximately 10 locations in four regions of Italy and arrested the financiers of the hacking activity. Those financiers allegedly used the information to transmit over 12 million minutes of telephone calls valued at more than $55 million...
  • Go to jail, get a laptop - Gitmo teaches computer literacy

    06/03/2009 10:53:25 AM PDT · by freespirited · 5 replies · 267+ views
    Geek.com ^ | 06/02/09 | Darleen Hartley
    An action by the US government is causing a flurry of not so complimentary comments across the internet. A group of 17 Uighur detainees who are on the road to release are being given laptops to train them for life outside Guantanamo. Army Lt. Col. Miguel Mendez oversees detainee classes, as well as the multilingual library and, now, the new virtual computer lab. “We’re getting them computer classes to prepare for their return.” Nury Turkel is a Uighur rights activist in Washington, D.C. He felt the computer training would “give hope to the men that their freedom is nearing” after...
  • China's 'secure' OS Kylin - a threat to U.S. offensive cyber capabilities?

    06/02/2009 11:58:03 PM PDT · by Cindy · 8 replies · 518+ views
    Blogs.ZDNET.com ^ | May 13, 2009, 6:23 am | Dancho Danchev
    May 13th, 2009 China's 'secure' OS Kylin - a threat to U.S offensive cyber capabilities? Posted by Dancho Danchev @ 6:23 am Categories: Browsers, Complex Attacks, Governments, Hackers, Kernel-level Exploits... Tags: China, Operating System, Operating Systems, Linux, Software... Picture a cyber warfare arms race where the participating countries have spent years of building offensive cyber warfare capabilities by exploiting the monoculture on one another’s IT infrastructure. Suddenly, one of the countries starts migrating to a hardened operating system of its own, and by integrating it on systems managing the critical infrastructure it successfully undermines the offensive cyber warfare capabilities developed...
  • The First War In Cyberspace

    05/26/2009 3:29:39 AM PDT · by Scanian · 5 replies · 652+ views
    The American Thinker ^ | May 26, 2009 | Ed Timperlake
    Cyberwar is now a fact of life in 21st Century wars. Actual and potential enemies of America already know the dimensions of Cyberwar and have moved into full combat. With a real world combat engagement in Georgia and Estonia, the Russians have shown skill. Make no mistake; in certain arenas the Russians are smart and capable, and as the invasion of Georgia shows, ruthless. They have world class scientists and engineers. It is well known they are excellent Cyber Warfighters who have now also apparently harnessed their criminal hackers to augment their worldwide reach. This melding of Russian conventional military...
  • Pentagon Seeks High School Hackers

    05/22/2009 10:35:55 PM PDT · by bruinbirdman · 21 replies · 940+ views
    Forbes ^ | 5/21/2009 | Andy Greenberg
    As a cyber space race looms, the military is looking for a few good geeks. High school hackers, crackers and digital deviants: Uncle Sam wants you. As part of a government information security review released as early as Friday, White House interim cybersecurity chief Melissa Hathaway likely will mention a new military-funded program aimed at leveraging an untapped resource: the U.S.' population of geeky high school and college students. The so-called Cyber Challenge, which will be officially announced later this month, will create three new national competitions for high school and college students intended to foster a young generation of...
  • NJ Man Pleads Guilty to Attack that Shut Down Church of Scientology Websites

    05/12/2009 4:04:18 PM PDT · by Larry381 · 4 replies · 375+ views
    Department of Justice ^ | May 11, 2009 | United States Attorney's Office Central District of California
    NEWARK, NJ—A New Jersey man pleaded guilty today to his role in a cyber attack on Church of Scientology websites in January 2008 that rendered the websites unavailable. Dmitriy Guzner, 19, of Verona, New Jersey, pleaded guilty to computer hacking charges originally filed in Los Angeles for his role in the distributed denial of service (DDOS) attack against the Scientology websites. A DDOS attack occurs where a large amount of malicious Internet traffic is directed at a website or a set of websites. The target websites are unable to handle the high volume of Internet traffic and therefore become unavailable...
  • Hackers Get Into U.C. Berkeley Health-Records Database

    05/09/2009 1:29:02 PM PDT · by Joiseydude · 11 replies · 560+ views
    SAN FRANCISCO — University of California, Berkeley, officials said Friday that hackers infiltrated restricted computer databases, putting at risk the personal information of 160,000 current and former students, alumni and others. The university said data include Social Security numbers, health insurance information and some medical records dating back to 1999. The databases also included personal information of parents and spouses as well as Mills College students who used or were eligible for Berkeley's health services.
  • COVERT RADIO SHOW - The Daily Blast [CYBERWARFARE;More]

    05/07/2009 2:57:53 PM PDT · by Cindy · 4 replies · 262+ views
    COVERT RADIO SHOW http://covertradioshow.com # http://covertradioshow.com/podcast.cfm?pid=187 Covert Radio Daily Blast May 7 North Korea has hackers working round the clock on cyberwarfare. Could they have been behind recent attacks on the Alaskan Air Traffic Control system? Are we prepared for Cyber Warfare? Narco Traffickers are declaring war on our cops, and the latest in the coming war between Georgia and Russia.
  • Mac OS X worm: time to get worried?

    05/06/2009 12:49:42 AM PDT · by Swordmaker · 12 replies · 670+ views
    ITWire ^ | Wednesday, 06 May 2009 | by Stephen Withers
    Symantec says a new worm targeting Mac OS X spreads via email and network shares. But is it really a threat?According to Symantec, the Tored worm spreads through network shares and by emailing itself to addresses gathered from the infected computer's Address Book. It opens a back door to the computer, allowing it to be conscripted into distributed denial of service attacks as well as logging keystrokes (which could be used to steal passwords and other confidential information). There is no indication that Tored can execute without user intervention. For example, Symantec does not seem to suggest that there are...
  • Hackers Break Into Virginia Health Professions Database, Demand Ransom

    05/05/2009 4:39:41 PM PDT · by Flavius · 19 replies · 963+ views
    washington post ^ | 5/5/09 | washington post
    Hackers last week broke into a Virginia state Web site used by pharmacists to track prescription drug abuse. They deleted records on more than 8 million patients and replaced the site's homepage with a ransom note demanding $10 million for the return of the records, according to a posting on Wikileaks.org, an online clearinghouse for leaked documents. Wikileaks reports that the Web site for the Virginia Prescription Monitoring Program was defaced last week with a message claiming that the database of prescriptions had been bundled into an encrypted, password-protected file.
  • Report: NKorea Operating Cyber Warfare Unit

    05/04/2009 9:42:12 PM PDT · by james500 · 13 replies · 626+ views
    AP ^ | 5/4/2009
    North Korea runs a cyber warfare unit that tries to hack into U.S. and South Korean military networks to gather confidential information and disrupt service, a news report said Tuesday. The North's military has expanded the unit, staffing it with about 100 personnel, mostly graduates of a Pyongyang university that teaches computer skills, Yonhap news agency reported, citing an intelligence agency it didn't identify. South Korea's Defense Ministry said it is aware that Pyongyang has been training hackers in recent years but did not provide details and had no other comment. The National Intelligence Service — South Korea's main spy...