Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $10,544
13%  
Woo hoo!! And we're now over 13%!! Thank you all very much!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • In North Korea, hackers are a handpicked, pampered elite

    12/06/2014 1:04:29 PM PST · by 2ndDivisionVet · 13 replies
    Reuters ^ | December 5, 2014 | Ju-min Park and James Pearson
    (VIDEO-AT-LINK) SEOUL-Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came under the microscope for a crippling hack into computers at Sony Pictures Entertainment. A North Korean diplomat has denied Pyongyang was behind the attack that was launched last month but a U.S. national security source said it was a suspect. Defectors from the North have said Bureau 121, staffed by some of the most talented computer experts in the insular state, is part of the General Bureau of Reconnaissance, an elite spy...
  • Network of Secret Chinese Military Attack US on Daily Basis: Costs trillions of $$, millions of jobs

    11/21/2014 11:25:09 AM PST · by 2ndDivisionVet · 11 replies
    Epoch Times ^ | November 21, 2014 | Joshua Philipp
    An army is attacking the United States. Its war is being waged without bullets or fanfare. Denied by its government, these soldiers operate in shadows and in silence. Yet, glimpses of their operations are seen on a daily basis—hackers and spies attacking and stealing from U.S. businesses and the U.S. government. Until now, a complete view of their operations and of the military department that gives them their orders remained hidden. Yet, China’s spy and cyberoperations all share one thing in common: they’re all orchestrated under the People’s Liberation Army General Staff Department (GSD), the Chinese military’s top-level department dedicated...
  • China, Hacking and Murder

    11/12/2014 11:01:32 AM PST · by Sean_Anthony · 3 replies
    Canada Free Press ^ | 11/12/14 | Cliff Kincaid
    Dr. Shane Truman Todd--Murdered not Suicide "Our country has been sold out for money and power, ...China has bought out our government." The press is reporting that Communist China has engaged in more computer hacking, this time of employee data at the U.S. Postal Service. But don’t worry. The Washington Post reports that the Obama administration has “strongly urged” China to “refrain” from hacking. Meanwhile, CNN is covering the “controversy” over whether Obama chewing gum at the Asia Pacific Economic Cooperation (APEC) summit in Beijing has offended some Chinese. No attention in the latest computer hacking scandal has been given...
  • 2nd Russian Hacker Group Accused of Targeting NATO

    10/28/2014 8:40:43 AM PDT · by WhiskeyX · 2 replies
    The Moscow Times ^ | Oct. 28 2014 14:56 | Matthew Bodner
    A U.S. security firm has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government. In a report issued Tuesday, security firm FireEye said the group, which the firm dubbed APT28, has since 2007 conducted “long-standing, focused operations that indicate a government sponsor — specifically, a government based in Moscow.”
  • The highly sophisticated hacking of Sharyl Attkisson's computers

    10/28/2014 6:06:07 AM PDT · by Former Proud Canadian · 62 replies
    Fox News ^ | October 28, 2014 | Howard Kurtz
    From the moment that Sharyl Attkisson met a shadowy source I’ll call Big Mac, she was plunged into a nightmare involving mysterious surveillance of her computers. They met at a McDonald’s in Northern Virginia at the beginning of 2013, and the source (she dubs him Number One) warned her about the threat of government spying. During their next hamburger rendezvous, Big Mac told Attkisson, then a CBS News reporter constantly at odds with the Obama administration, that he was “shocked” and “flabbergasted” by his examination of her computer and that this was “worse than anything Nixon ever did.” Attkisson’s forthcoming...
  • Ex-CBS reporter: Government agency bugged my computer {Sharyl Attkinson]

    10/27/2014 7:24:48 AM PDT · by SeekAndFind · 35 replies
    New York Post ^ | 10/27/2014 | By Kyle Smith and Bruce Golding
    A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a “government-related entity” that planted classified documents on her computer. In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was “shocked” and “flabbergasted” at what the analysis revealed. “This is outrageous. Worse than anything Nixon ever did. I wouldn’t have believed something like this could happen in the United States of America,” Attkisson quotes the source saying. She speculates that the...
  • China-backed hackers may have infiltrated Apple's iCloud

    10/20/2014 7:36:36 PM PDT · by Citizen Zed · 17 replies
    Yahoo / Reuters ^ | 10-21-2014
    Apple Inc's iCloud storage and backup service in China was attacked by hackers trying to steal user credentials, a Chinese web monitoring group said, adding that it believes the country's government is behind the campaign. Using a method called a "man-in-the-middle" (MITM) attack, unknown hackers interposed their own website between users and Apple's iCloud server, intercepting data and potentially gaining access to passwords, iMessages, photos and contacts, Greatfire.org wrote in its blog post. Greatfire.org, a group that conducts research on Chinese Internet censorship, alleged government involvement in the attack, saying it resembled previous attacks on Google Inc, Yahoo Inc and...
  • Cyber security Expert Gary Milefsky (flashlight app on smartphones)

    10/19/2014 5:43:12 AM PDT · by Mechanicos · 17 replies
    YouTube ^ | Unknown | Bret Baire via YouTube
    http://www.youtube.com/watch?v=Q8xz8xKEFvU/a>
  • Maybe Better If You Don’t Read This Story on Public WiFi

    10/18/2014 7:52:38 AM PDT · by GonzoII · 22 replies
    Medium.com ^ | 15 Oct 2014 | Maurits Martijn
    We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled. In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. It is a sunny day and almost all the tables are occupied. Some people talk, others are working on their laptops or playing with their smartphones. Wouter removes his laptop from his backpack,...
  • Jennifer Lawrence Speaks About Nude Photo Hack: 'It Is Not A Scandal. It Is A Sex Crime.'

    10/07/2014 7:37:58 AM PDT · by SeekAndFind · 109 replies
    Business Insider ^ | 10/07/2014 | Pamela Engel
    After remaining mostly silent since nude photos of her were taken from her phone and leaked online, actress Jennifer Lawrence has spoken out at length to Vanity Fair about the hack. "It is not a scandal. It is a sex crime," Lawrence told Vanity Fair. "It is a sexual violation. It’s disgusting. The law needs to be changed, and we need to change. That’s why these websites are responsible." "Just the fact that somebody can be sexually exploited and violated, and the first thought that crosses somebody’s mind is to make a profit from it. It’s so beyond me. I...
  • FBI Director: China Has Hacked Every Big US Company

    10/06/2014 6:28:40 AM PDT · by blam · 38 replies
    BI ^ | 10-6-2014 | James Cook
    October 6, 2014 James CookIn his first major television interview, the director of the FBI has warned that Chinese hackers have embarked on a widespread campaign of cyberwarfare against the US. Speaking to CBS' "60 Minutes," James Comey had the following to say on Chinese hackers: There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese. When asked whether Chinese hackers were particularly good at gaining access to servers belonging to US companies, Comey said the hackers were not...
  • Hackers Have Found A Flaw In Macs And Are Using It To Control 17,000 Apple Computers ... Via Reddit

    10/03/2014 8:06:46 AM PDT · by SeekAndFind · 57 replies
    Business Insider ^ | 10/03/2014 | James Cook
    Criminals have discovered a flaw in OS X, the Mac operating system, and are using it to control thousands of Apple computers around the world. The Russian security company Dr. Web first discovered the software, known as "Mac.BackDoor.iWorm." We don't yet know how the software spreads, but Dr. Web has released information on the clever way it connects to the criminals who control the program. When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. The iWorm reportedly uses Reddit's search function to find comments left by the criminals in a Minecraft...
  • 5 ways to protect yourself from data breaches

    09/20/2014 5:21:39 AM PDT · by TurboZamboni · 9 replies
    Pioneer Press ^ | 9-20-14 | Joseph Pisani
    NEW YORK (AP) — Data breaches at retailers aren't going away but there are ways consumers can protect themselves from future heists of their payment card information. Home Depot said Thursday that malicious software lurking in its check-out terminals between April and September affected 56 million debit and credit cards that customers swiped at its stores. Target, Michaels and Neiman Marcus have also been attacked by hackers in the past year.
  • Jennifer Lawrence Deserves Justice not Sympathy

    09/13/2014 11:13:57 AM PDT · by SeekAndFind · 53 replies
    Townhall ^ | 09/13/2014 | John Nantz
    Storing indiscreet photos in the “Cloud”is stupid. Jennifer Lawrence and a long list of other Hollywood starlets, models, and personalities must certainly now agree. The dust has settled somewhat surrounding the criminal hacking of Apple’s iCloud and the subsequent theft of nude photos stored there by a naive group of female celebrities. It’s easy to see that a crime has been committed and any rational person must agree that the perpetrator ought to be brought to justice, on this point there really is no debate. However, this incident is pregnant with irony. In monotonous unity and with the tempo of...
  • This Site Says It Will Tell If Your Gmail Password Was Hacked [But is it legit?]

    09/11/2014 9:18:25 AM PDT · by SeekAndFind · 16 replies
    Business Insider ^ | 09/11/2014 | Julie Bort
    As you may have heard, Russian hackers have published the passwords for roughly five million Gmail accounts. This follows the publication of millions of passwords for two of Russia's largest email services, Yandex and Mail.Ru.Chances are, your account is not one of the hacked Gmail accounts, because that figure of five million represents only a fraction of the number of Gmail accounts that are active in the world. For instance, the Gmail app has been downloaded one billion times to Android devices. Even back in 2012, Gmail had 350 million users.But a group of programmers have decided to help you check...
  • US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info

    08/20/2014 7:38:03 AM PDT · by SeekAndFind · 6 replies
    Christian Post ^ | 08/20/2014 | BY SAMUEL SMITH
    One of America's largest hospital chains is the latest to fall victim to a group of sophisticated Chinese hackers who compromised 4.5 million patients' data including social security numbers in April and June. The cyber attack is the largest ever reported by a U.S. health care company and should serve as a warning to get more private companies to take their cyber protection more seriously. "Many companies are instituting anti-malware controls to detect malware prior to infection," said Kroll Cyber Investigations Managing Director Timothy P. Ryan in an email interview with The Christian Post. "Other companies are incorporating more robust...
  • Many home routers supplied by ISPs can be compromised en masse, researchers say

    08/11/2014 9:36:34 PM PDT · by Utilizer · 44 replies
    CSO ^ | 10 August, 2014 23:33 | Lucian Constantin (IDG News Service)
    Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn. By gaining access to such servers, hackers or intelligence agencies could potentially compromise millions of routers and implicitly the home networks they serve, said Shahar Tal, a security researcher at Check Point Software Technologies. Tal gave a presentation Saturday at the DefCon security conference in Las Vegas. At the core of the problem is an increasingly used protocol known as TR-069 or CWMP (customer-premises equipment wide area network...
  • How to Use Your Cat to Hack Your Neighbor’s Wi-Fi

    08/10/2014 8:37:05 AM PDT · by Utilizer · 55 replies
    W I R E D ^ | 08.08.14 6:30 am | By Andy Greenberg
    How to Use Your Cat to Hack Your Neighbor’s Wi-Fi It appears that wired.com cannot be posted per their copyright complaint. Ignore the clickable link, it only points back to the FR index page... The link has more info... and a few pics. :) http://www.wired.com/2014/08/how-to-use-your-cat-to-hack-your-neighbors-wi-fi/
  • Visit the Wrong Website, and the FBI Could End Up in Your Computer

    08/05/2014 10:18:32 PM PDT · by Utilizer · 58 replies
    W I R E D ^ | 08.05.14 6:30 am | Kevin Poulsen
    Apparently, the feebs have been using malware and the TOR network to snoop on quite a bit more information than one might have suspected. Use the following link here for more info: http://www.wired.com/2014/08/operation_torpedo/
  • SynoLocker demands 0.6 Bitcoin to decrypt Synology NAS devices

    08/05/2014 10:42:14 AM PDT · by Utilizer · 22 replies
    CSO ^ | on 04 August, 2014 09:53 AUS | Liam Tung (CSO Online (Australia)
    Synology network attached storage (NAS) devices, capable of storing terabytes of data, have been targeted by ransomware that encrypts victims’ files. Owners of Synology's NAS devices might want to unplug their storage boxes now to avoid being affected by ransomware that uses strong encryption to lock files on the brand’s machines and demands US$350 for the decryption key. The new attack on Synology kit comes within a year of Synology NAS devices being struck by fraudulent Bitcoin mining operators, with several owners on Sunday reporting that they had found a message from the “SynoLocker Automated Decryption Service” — when accessing...