Free Republic 4th Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $11,349
14%  
Woo hoo!! And we're now over 14%!! Thank you all very much!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • SSA.GOV - A Hackers Tool

    06/02/2015 7:57:58 AM PDT · by the_boy_who_got_lost · 7 replies
    LinkedIn.com ^ | Jun 2, 2015 | Timothy Martens
    The ssa.gov website is vulnerable in several ways, and when it comes to identity thief's no one is a better friend or more helpful with validating data or filling in the blanks or even stealing complete Social Security Account Numbers. Social Security Account Numbers are said to be the Holy Grail of identity theft. Stealing Social Security Numbers Hackers may easily steal Social Security Account Numbers from the Social Security Administration's website ssa.gov making Everyone who has ever been issued a Social Security Account Number vulnerable to identity theft should hackers choose to use this attack vector. This vulnerability is...
  • 1.25 million affected by Japan Pension Service hack

    06/02/2015 3:23:42 AM PDT · by dynachrome · 1 replies
    Japan Times ^ | 6-1-15 | TOMOKO OTAKE
    The national pension system has been hacked, leading to 1.25 million cases of personal data being leaked, the Japan Pension Service announced Monday. In a scandal reminiscent of the nation’s botched handling of pension records about a decade ago, people’s pension IDs, names, addresses and birth dates have been stolen through illicit accesses to fund workers’ personal computers, fund officials said. The data were leaked when agency employees opened an attached file in their email containing a virus.
  • How Hackers Steal Your Social Security Number

    06/01/2015 6:06:16 AM PDT · by the_boy_who_got_lost · 8 replies
    LinkedIn.com ^ | Timothy Martens
    Your Social Security Number can be stolen in under an hour. And hundreds of website run by the government, universities and financial institutions among other companies are at fault. ... ... ... It works essentially in the following way. Is my victim's SSN 123-45-6789? No! Is my victim's SSN 123-45-6790? No! Is my victim's SSN 123-45-6788? Yes! ... ... ... Very commonly all the hacker needs is: A victim’s last name A victim's birth date A vulnerable website the victim uses. ... ... ... Are any big players exposing SSN’s? I have a list of hundreds of websites who are...
  • United Airlines Kicks Computer Expert Off Flight For Tweets

    04/19/2015 8:59:46 PM PDT · by QT3.14 · 46 replies
    International Business Times ^ | April 19, 2015 | Eric Markowitz 
    Chris Roberts, a prominent computer security expert, was aboard a United Airlines flight last week when he tweeted about a potential security flaw he found on the plane’s on-board Wi-Fi. Big mistake. Airline personnel saw the tweet and alerted authorities at Syracuse Hancock International Airport where the flight was scheduled to land. Roberts exited the plane and was quickly detained by the FBI. Roberts, the founder and chief technical officer of the Denver security firm One World Labs, said the agents questioned him, confiscated several of his electronic devices, and then let him go. “Lesson from this evening, don't mention...
  • 8th Grader Faces Felony Charges for Changing Teacher’s Computer Background

    04/13/2015 1:19:58 PM PDT · by yuffy · 39 replies
    Time.com ^ | April 10, 2015 | Laura Stampler
    Pranksters be warned Eight-grader Domanik Green was arrested on felony charges in Holiday, Fla. Wednesday after breaking into his teacher’s computer to change the background picture to two men kissing. Green, 14, who was released the day of his arrest, said that he broke into the computer of teacher he didn’t like after realizing that faculty members’ passwords were simply their last names, the Tampa Bay Times reports. Green, who previously faced a three-day suspension for a similar prank, said that many students got in trouble for breaking into teachers’ computers.
  • French media groups to hold emergency meeting after Isis cyber-attack

    04/09/2015 8:01:32 PM PDT · by grey_whiskers · 6 replies
    The Guardian ^ | April 9 2014 | Angelique Chrisafis in Paris and Samuel Gibbs
    France’s culture minister is to call an urgent meeting of French media groups to assess their vulnerability to hacking after the public service television network TV5Monde was taken over by individuals claiming to belong to Islamic State, blacking out broadcasts as well as hacking its websites and Facebook page. All TV5Monde broadcasts were brought down in a blackout between 10pm and 1am local time on Wednesday to Thursday by hackers claiming allegiance to Isis. They were able to seize control of the television network founded by the French government in 1984, simultaneously hacking 11 channels as well as its website...
  • BBC hacked by ISIS? 'Operational error' sparks fears [truncated due to length]

    04/09/2015 7:59:21 PM PDT · by grey_whiskers · 5 replies
    The Mirror ^ | April 9, 201 | Danny Walker
    The BBC was feared to have fallen victim to an ISIS cyber-attack this evening as 'hackers' appeared to post Islamic State propaganda during a live broadcast. Viewers were left stunned as the words 'Je suIS IS' appeared on TV screens following a feature on the BBC News Channel. Above the red and white writing was the word 'CYBERCALIPHATE'.
  • Former DIA chief: It's Highly likely Hillary’s e-mails got hacked by friends and foes alike

    04/07/2015 11:07:17 AM PDT · by SeekAndFind · 16 replies
    Hotair ^ | 04/07/2015 | Ed Morrissey
    “If you’re using one device,” former Defense Intelligence Agency chief Lt. Gen. Michael Flynn told Megyn Kelly last night in a discussion of Hillary Clinton’s e-mails, “then nothing’s personal.” Of course, we know now that Hillary used multiple devices despite her claims otherwise after the exposure of her private e-mail system, but that’s hardly the worst of it. The former intelligence commander tells Kelly that penetration of Hillary’s communications by hostile powers was not just possible but “likely,” and the odds are “very high” that both friends and foes had a ringside seat to American diplomatic strategies for several...
  • ‘Fido’ unleashed: Google, Wells Fargo, IRS embrace universal Biometric ID System

    03/27/2015 9:31:10 AM PDT · by Sean_Anthony · 12 replies
    Canada Free Press ^ | 03/27/15 | Gretchen Olson
    Fast ID Online and passwordless authentication, still dealing with hackers in a cyberworld With the roll-out of the Apple Pay thumb-scanning payment system late last year, biometric identification has been introduced into the daily lives of Americans. But Apple Pay is only the beginning of a biometric revolution coming to the United States and countries around the world. Heads of global technology companies, along with top officials in the federal government, have been working for several years on creating a “universal” system for identification of every citizen using the internet. And it goes by the friendly label, FIDO. FIDO, an...
  • Vanity - Concerning Security Warning at National Review Website

    03/23/2015 8:37:01 AM PDT · by Steve_Seattle · 30 replies
    Vanity
    For the second day in a row, I have gotten a strange security warning when trying to enter the National Review website. It warns me of spyware, gives me a phone number to call, and even has a voice message. I have not found a way to escape that message short of shutting down my computer. It seems to be a fake security warning. Has anyone else encountered this problem? If so, do you know what is going on and what to do about it? Thanks.
  • Leaked: Bin Laden not buried at sea, body moved on CIA plane to US...

    02/11/2013 11:24:55 PM PST · by My Favorite Headache · 107 replies
    Wikileaks ^ | 2/12/13
    The body of Al-Qaeda leader Osama Bin Laden was not buried at sea, according to leaked emails of intelligence firm Stratfor, as revealed by WikiLeaks. Stratfor’s vice-president for intelligence, Fred Burton, believes the body was “bound for Dover, [Delaware] on [a] CIA plane” and then “onward to the Armed Forces Institute of Pathology in Bethesda [Maryland],” an email says. The official version is that the body of Al-Qaeda’s top man, who was killed by a US raid in Pakistan on May 2, 2011, was buried at an undisclosed location at sea in a proper Muslim ceremony. "If body dumped at...
  • Clinton’s Pardons for Pedophiles: No crime too horrific that a large donation won’t solve.

    10/24/2014 8:51:44 AM PDT · by SeekAndFind · 11 replies
    FrontPage Mag ^ | 10/23/2014 | Daniel Greenfield
    The Office of the Inspector General of the State Department found in its latest investigation that Clinton aides had “created an appearance of undue influence and favoritism” in a number of cases including that of Ambassador Howard Gutman. The investigation is largely a whitewash. There is no mention of the fact that one whistleblower related to the case, Richard Higbie, had his emails deleted by a hacker. Or that the main whistleblower, Aurelia Fedenisn, was harassed at home and had her law firm burgled.It goes almost without saying that Richard Nixon went down for much less than that.There is also...
  • Windows software corruption

    02/25/2015 5:15:58 AM PST · by GYPSY286 · 80 replies
    Me | February 25, 2015 | Gypsy286
    I need some advice from Freeperland folks who are savvy with computer issues. Last evening, I received a call from a "Windows Security Center". They knew my name and obviously my phone number. Gave me a spiel that Windows software security had been compromised/corrupted and according to their records, knew I had Windows 7. To prove they were legit, they had me start my computer and prompted me through a series of commands to bring up my specific Windows license number. She read it off and that license numbers was listed on my machine. She prompted me to run a...
  • Researchers stumble across Arab-speaking cybercriminal group

    02/18/2015 6:43:23 AM PST · by Ernest_at_the_Beach · 3 replies
    tweaktown.com ^ | Posted: 2 hours, 35 mins ago | Michael Hatamoto
    The Operation Arid Viper campaign has successfully stolen more than 1 million files with current malware campaigns underway, though it's not the usual suspects, according to Kaspersky Lab and Trend Micro. The Arab-speaking group, with ties to Gaza, have targeted foreign government offices, critical infrastructure, military, universities, and other high-profile targets. The attacks likely occurred starting in mid-2013 and a full investigation into their actions is underway.   "Whoever the real culprits are, it is clear that they are part of the Arab world, evidence of a budding generation of Arab hackers and malware creators intent on taking down their...
  • The largest bank robbery ever: up to $900M possibly stolen, and no need for a getaway ca

    02/16/2015 8:43:24 AM PST · by Kartographer · 12 replies
    NGR News via Yahoo ^ | 2/16/15 | Chris Smith
    When hackers steal money from banks, they usually go for Bonnie and Clyde attacks, taking whatever they can take in a single grab, one Kaspersky executive told The New York Times, as the security research discovered a different type of bank cyber heist, one likened to Ocean’s Eleven in terms of planning, but also when it comes to the significant amount of stolen cash. Following a well planned operation, that involved months of spying through the use of sophisticated software, unknown hackers originating from Russia, China and Europe managed to steal at least $300 million from a large number of...
  • Bank Hackers Steal Millions via Malware

    02/14/2015 3:03:20 PM PST · by dynachrome · 14 replies
    New York Times ^ | 2-14-15 | DAVID E. SANGER and NICOLE PERLROTH
    In a report to be published on Monday, and provided in advance to The New York Times, Kaspersky Lab says that the scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery. The Moscow-based firm says that because of nondisclosure agreements with the banks that were hit, it cannot name them. Officials at the White House and the F.B.I. have been briefed on the findings, but say that it will take time to confirm...
  • DOJ Inspector General Report Finds No Evidence for Attkisson’s Hacking Claims

    01/29/2015 6:39:55 PM PST · by Nachum · 57 replies
    Mediaite ^ | 1/29/15 | Josh Feldman
    Many of the allegations made by former CBS News reporter Sharyl Attkisson regarding alleged computer intrusions by the U.S. government are disputed in a report by the Justice Department’s inspector general. “The OIG’s investigation was not able to substantiate the allegations that Attkisson’s computers were subject to remote intrusion by the FBI, other government personnel, or otherwise,” reads the inspector general’s report. In her book “Stonewalled,” Attkisson had issued a wide-ranging set of claims — that her CBS News work computers and her personal computer had been hacked, that a strange wire was found hanging from the cable TV/broadband box
  • Free Speech Defined @ MLA

    01/27/2015 7:56:02 AM PST · by Academiadotorg · 6 replies
    Accuracy in Academia ^ | January 25, 2015 | Spencer Irvine
    The academically free have different ideas of what free speech means than the rest of us do. At the Modern Language Association’s 2015 convention in Vancouver, Canada, Rosaura Sanchez, a former protester-and-activist-turned-Latin American and Chicano literature-professor at UC-San Diego, claimed that professors do face “consequences to speaking out on campus” She went on to allege that she has been “surveilled and recorded” while at protests by campus administrators. Most people do not use freedom of expression in order to keep the expressed thought a big secret. Sanchez asserted that on her campus “dissenters names are placed in a black book,”...
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 56 replies
    Slashdot.org ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • NSA Details Chinese Cyber Theft of F-35, Military Secrets

    01/22/2015 6:20:36 PM PST · by Spktyr · 43 replies
    The Washington Free Beacon ^ | 22 Jan 2015 | Bill Gertz
    Subheadline: Chinese hackers pillaged U.S. defense, contractor networks for critical data China obtained more than 50 terabytes of data from U.S. defense and government networks, notably the Joint Strike Fighter’s stealth radar and engine secrets, through cyber espionage, according to newly disclosed National Security Agency documents. A NSA briefing slide labeled “Top Secret” and headlined “Chinese Exfiltrate Sensitive Military Data,” states that the Chinese have stolen a massive amount of data from U.S. government and private contractors. The document was made public by the German magazine Der Spiegel in a two articles detailing how NSA in the mid-2000s was capable...