Free Republic 4th Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $33,052
40%  
Woo hoo!! And now only $158 to reach 41%!! Thank you all very much!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • 'Military computer hacker' faces extradition to US

    06/08/2005 8:31:49 AM PDT · by liberallarry · 5 replies · 528+ views
    The Guardian (England) ^ | June 8, 2005 | staff
    A British man appeared in court today over allegations that he hacked into the US military computer system causing damage worth hundreds of thousands of pounds.Gary McKinnon, 39, faces extradition to the US over claims that he accessed 97 government computers over a one-year period. District judge Christopher Pratt granted him bail to reappear for an extradition hearing on July 27.He was ordered to provide £5,000 security, report to his local police station, not to apply for any international travel documents and not to use any computer equipment allowing him to access the internet as bail conditions. "On one instance,...
  • Teen seeks judge's help to graduate

    06/07/2005 10:29:07 AM PDT · by SmithL · 17 replies · 969+ views
    Sacramento Bee ^ | 6/7/5 | Ramon Coronado
    A Laguna Creek High School senior says he's innocent. But the school district says he hacked into the school computer to change his grades. Today, the student takes the district to court to win the right to graduate with the class of 2005. "It is the completion of four years of hard work. It is a rite of passage," said Alexander Ochoa, an honors student who plans to be in Sacramento Superior Court today to persuade a judge to allow him to receive his diploma with the rest of his class in Wednesday's ceremony. Graduation for Ochoa is the first...
  • Fret About PC Zombie Threat?

    05/28/2005 8:47:26 AM PDT · by TigerLikesRooster · 9 replies · 655+ views
    Yahoo! News ^ | 05/27/05 | Scarlet Pruitt
    Fret About PC Zombie Threat? Scarlet Pruitt, IDG News Service Fri May 27,12:00 PM ET LONDON-- Worried about zombies? Internet users concerned about the number of virus-infected PCs ready to launch an attack over the Web can at least keep track of how afraid they should be--and satisfy their curiosity--by visiting CipherTrust Inc.'s new ZombieMeter resource. The security company added the ZombieMeter to its Web site this week, offering visitors hourly information on the global activity of new zombies by tracking data it receives through its IronMail e-mail security appliances. Zombiesare Internet-connected computers that have been infected by malicious code...
  • Vigilante hackers use Old West tactics for cyberspace justice

    05/25/2005 10:40:46 AM PDT · by Golden Eagle · 16 replies · 1,346+ views
    Yahoo News ^ | May 25, 2005 | AFP
    WASHINGTON (AFP) - Angered by the growing number of Internet scams, online "vigilantes" have started to take justice into their own hands by hacking into suspected fraud sites and defacing them. These hackers have targeted fake websites set up to resemble the sites of banks or financial institutions in recent weeks, and have inserted new pages or messages. Some say "Warning - This was a Scam Site," or "This Bank Was Fraudulent and Is Now Removed." The efforts by the self-proclaimed "hero hackers" come amid a surge in online schemes known as "phishing" in which victims are lured to fake...
  • Apple's Dashboard Hacked

    05/09/2005 10:51:17 PM PDT · by Stoat · 52 replies · 1,681+ views
    Top Tech News ^ | May 9, 2005
    Apple's Dashboard Hacked May 9, 2005 1:50PM What makes the issue particularly difficult to deal with, according to Stephan.com, is Apple's decision not to provide a documented way to remove Widgets once installed. In fact, Apple's Mac OS X Help files state specifically that "You cannot remove widgets from the Widget Bar or change their order."   A developer has demonstrated a Dashboard exploit in Mac OS X 10.4 "Tiger" that a malicious Web site owner could use to install Widgets you might not want on your Mac. Writing under the name of Stephan.com, the developer said that a...
  • DRUDGE: Feds Investigate Huge Computer Attack; Worldwide Hunt for 'Stakkato'

    05/09/2005 6:11:18 PM PDT · by West Coast Conservative · 47 replies · 3,513+ views
    Drudge Report ^ | May 9, 2005 | Matt Drudge
    1000s of computer systems serving U.S. military, NASA, prominent research labs have been penetrated by 'single intruder or a small band, apparently based in Europe'... MORE... Spokeswoman for White Sands Missile Range in New Mexico confirmed there has been 'unauthorized access'... Developing...
  • INCREASED MAC OS X HACKING ACTIVITY

    04/30/2005 1:52:59 PM PDT · by Swordmaker · 46 replies · 1,527+ views
    TruSecure ^ | 4/26/2005 | Trusecure
    INCREASED MAC OS X HACKING ACTIVITY Current Assessment: Hype Current Assessment Date: 04/06/2005 Executive Summary: The attention devoted to the non-existent Mac OS X malicious code "problem" during the past several days is not warranted. However, it is possible to configure or use a system running Mac OS X in such a way as to make it vulnerable to malicious attackers. Proper configuration and use is critical with all Internet-connected devices. Threat: Low Vulnerability Prevalence: Low Cost: Medium Details: The past several days have seen a rash of technology press stories regarding Mac OS X ("ten") malicious code (malcode) and...
  • French court rules in favor of DVD copying

    04/24/2005 7:33:58 AM PDT · by Phsstpok · 87 replies · 1,343+ views
    Engadget ^ | April 23, 2005 | Peter Rojas
    Still trying to find something in English to properly confirm all the details about this, but apparently a French court has ruled that adding anti-copying mechanisms to a DVD violates the rights consumers have to make private copies of media that they’ve bought and paid for. Reportedly the court has given the company that released the film in question one month to provide the guy who sued them with an unprotected DVD; it’s not entirely clear whether this ruling applies to every DVD sold in France or just that one copy of Mulholland Drive this guy was trying to dub....
  • Mark Hacking Pleads Guilty to Murder

    04/15/2005 1:53:09 PM PDT · by nuconvert · 3 replies · 660+ views
    Mark Hacking Pleads Guilty to Murder , April 15, 2005 SALT LAKE CITY — Mark Hacking (search) has pleaded guilty to charges of murdering his wife. The Utah man admitted shooting his wife, Lori Hacking (search), and dumping her body in a garbage bin. There was speculation after Hacking was arrested that he would plead innocent by reason of insanity, after revelations of a series of bold lies he had told his family and a bizarre incident after he reported his wife missing that led to a stay in a psychiatric hospital. Local newspapers reported that none of the possible...
  • The Feds can own your WLAN too

    04/05/2005 11:34:01 AM PDT · by atomic_dog · 128 replies · 2,277+ views
    tom's networking ^ | March 31, 2005 | Humphrey Cheung
    Millions of wireless access points are spread across the US and the world. About 70% percent of these access points are unprotected—wide open to access by anyone who happens to drive by. The other 30% are protected by WEP (Wired Equivalent Privacy) and a small handful are protected by the new WPA (Wi-Fi Protected Access) standard. At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack,...
  • IE 'Unsafe' 98 Percent Of 2004, says ScanIT

    03/28/2005 1:39:32 PM PST · by Redcloak · 11 replies · 746+ views
    TechWeb ^ | Fri Mar 25, 3:19 PM ET | staff
    As Mozilla and Microsoft executives argue about which browser -- Firefox or Internet Explorer -- is more secure, fans of the former have numbers on their side, a Belgian security consultancy said this week. According to Brussels-based ScanIT, users of Microsoft's Internet Explorer (IE) were "unsafe" 98 percent of the time during 2004, while Mozilla users -- which would include those using Mozilla and Firefox -- were "unsafe" only 15 percent of last year. ScanIT determined the unsafe periods by examining the life spans of vulnerabilities in IE, Mozilla, and Opera -- a Norwegian browser that has a nearly...
  • Gigs & Bytes:Hollywood Hacking

    03/08/2005 3:04:12 PM PST · by fight_truth_decay · 3 replies · 593+ views
    PollStar ^ | Tue, Mar 08 2005 | Staff
    As Paris Hilton continues as the poster child for smart-phone security, there are now rumblings that cyber-protection at this year's Academy Awards wasn't all that secure. According to The New York Times, three employees of Flexilis, a rather new hi-tech company specializing in applications utilizing Bluetooth WiFi technology, stood on the sidelines as Hollywood's elite made their way down the red carpet and into the Kodak Theatre. Their mission? To determine if anyone's smart phones were vulnerable to hackers. To do this, one of the Flexilis three carried a backpack containing a laptop, scanning software and an antenna. The results?...
  • U.S. identity thefts spurs Senate hearings (ChoicePoint)

    02/24/2005 12:14:37 PM PST · by holymoly · 4 replies · 514+ views
    Azstarnet.com ^ | Feb 24 2005 | JESSE J. HOLLAND
    WASHINGTON (AP) -- A Senate committee will hold hearings on identity theft and information brokers following the revelation that a databank with information on millions of people was accessed by criminals, the committee chairman said Thursday. Democrats, including Sens. Patrick Leahy of Vermont, Dianne Feinstein of California and Charles Schumer of New York, have been calling for a Judiciary Committee inquiry into whether more regulation of companies such as ChoicePoint Inc. that buy and sell personal data is needed. "I got a letter from Senator Leahy yesterday on identity theft issue and I immediately said we can hold a hearing,"...
  • Cell Phones & Privacy

    02/22/2005 7:58:26 AM PST · by hsmomx3 · 9 replies · 227+ views
    self
    Wouldn't you know, a few days after we signed up for T-Mobile service (they had a good deal for our needs), I hear about this Paris Hilton thing. How does someone hack into your stuff? Is it because they access IM and the internet via the phone? We only use ours for emergency phone calls and never for internet or chat purposes. I am just curious as to how this can happen.
  • Cheektowaga teen accused of computer crimes

    02/19/2005 8:14:16 AM PST · by holymoly · 11 replies · 791+ views
    Buffalo News
    A Cheektowaga teenager, a whiz kid on the computer, has been arrested in Los Angeles and accused of bombarding Internet users with more than a million spam e-mails. Not only is the 18-year-old accused of computer hacking and violating federal spam laws, but he allegedly threatened to wreak more havoc on a California Internet company if it didn't give him exclusive marketing rights to its customers, federal authorities said. Anthony Greco, a former Erie Community College student, is accused of creating thousands of accounts on MySpace.com, an online meeting place, and using them to send about 1.5 million unsolicited commercial...
  • An Open Letter To The Hacker Of CollegeConservative.com

    01/19/2005 3:55:07 PM PST · by jll8914 · 6 replies · 251+ views
    CollegeConservative.com ^ | 1/19/2005 | Jonathan Lane
    Dear Sir or Madam, I offer you my congratulations. This afternoon, you successfully hacked CollegeConservative.com, changing her majestic home page to your laughable, never-grew-out-of-my-highschool-spike-haired-skateboard-punk-stage, anarchist-wannabe propaganda. I suspect your method was to exploit a widely known security gap within the phpBB2 bulletin board system. Your intellect is impressive. Your power, humbling. My sarcasm, thick and heavy ... not unlike your mother.
  • Hacker penetrates T-Mobile systems

    01/16/2005 4:16:38 PM PST · by vivabushchick · 165+ views
    Security Focus News ^ | January 11,2005 | Kevin Poulsen
    A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned. Twenty-one year-old Nicolas Jacobsen was quietly charged with the intrusions last October, after a Secret Service informant helped investigators link him to sensitive agency documents that were circulating in underground IRC chat rooms. The informant also produced evidence that Jacobsen was behind an offer to provide T-Mobile customers' personal information to identity thieves...
  • Hacker Breaches T-Mobile Systems, Reads US Secret Service Email

    01/13/2005 11:16:20 AM PST · by Yonkers Finest · 28 replies · 1,957+ views
    The Register ^ | January 12, 2005 | By Kevin Poulsen
    Hacker Breaches T-Mobile Systems, Reads US Secret Service Email By Kevin Poulsen, SecurityFocus Published Wednesday 12th January 2005 09:47 GMT A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor US Secret Service email, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned. Twenty-one year-old Nicolas Jacobsen was quietly charged with the intrusions last October, after a Secret Service informant helped investigators link him to sensitive agency documents that were circulating in underground IRC chat rooms....
  • Postpartum Mountains and Molehills

    12/29/2004 2:09:52 PM PST · by Dr.Syn · 6 replies · 324+ views
    dansargis.org ^ | December 30, 2004 | Dan Sargis
      Postpartum Mountains and Molehills December 30, 2004 Watergate step aside...the newshounds over at the Washington Post dug deep for a rapidly breaking story...”Man Bites Dog!”  In a special three-part series, Pregnancy and Homicide/The Unknown Toll, the Post reported the results of its one year investigation into the murder rate of pregnant women.  As reported, “A year-long examination by The Washington Post of death-record data in states across the country documents the killings of 1,367 pregnant women and new mothers since 1990.”  That comes to a grand total of 97.64 murdered pregnant women and new mothers per year. According to the Centers...
  • Liberal Leftists Cheating (Voter Fraud) at the Weblog Awards

    Leftists Stealing Votes That Don't (Really) Count? In a matter of only hours, two left wing blogs - Kos and Atrios - went from the bottom of the pack of blogs and suddenly pulled ahead by a pretty fat margin in the Best Overall Blog category in the Wizbang Weblog Awards. I have a deep suspicion that (ahemm) someone rigged the poll. There is a huge possiblity that someone could have nixed the system, and after roaming at Kos and Atrios, Atrios hasn't even advertised himself in the Weblog Awards! I humbly ask that Mr. Alyward, chairman of the Election...