Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $41,714
51%  
Woo hoo!! And now only $406 to reach 52%!! Thank you all very much!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • Macsmind Hacking UPDATE(Hacking traced to Obama IP)

    08/04/2008 5:52:32 AM PDT · by SE Mom · 26 replies · 278+ views
    MacsMind ^ | 2 August 2008 | MacRanger
    Confederate Yankee notes further possible examples by Obama supporters getting Google to suspend sites for “Terms of Service” violations. Instapundit tries to douse the theories, but here is one fact that can’t be explained away. On July 22-25 Macsmind was DOS’d (Denial of Service) that originated from three IP addresses that are assigned to Barack Obama’s website. This isn’t a theory but was confirmed via law enforcement through an inspection of the site logs from those dates. The IP address in question; 66.39.4.254 66.39.143.229 216.146.206.181, are all registered via “Go Daddy” under the name barackobama.com. On those dates, beginning at...
  • Dutch university can publish controversial Oyster research

    07/20/2008 12:29:47 AM PDT · by Schnucki · 10 replies · 241+ views
    The Register ^ | July 18, 2008 | Jan Libbenga
    Dutch researchers will be able to publish their controversial report on the Mifare Classic (Oyster) RFID chip in October, a Dutch judge ruled today. Researchers from Radboud University in Nijmegen revealed two weeks ago they had cracked and cloned London's Oyster travelcard and the Dutch public transportation travelcard, which is based on the same RFID chip. Attackers can scan a card reading unit, collect the cryptographic key that protects security and upload it to a laptop. Details are then transferred to a blank card, which can be used for free travel. Around one billion of these cards have been sold...
  • California Teenagers Face Prison for Hacking Into School Computers

    06/20/2008 9:13:52 PM PDT · by Amelia · 26 replies · 153+ views
    Fox News ^ | Friday, June 20, 2008 | Paul Wagenseil
    County prosecutors allege Omar Khan, 18, of Coto de Caza, and Tanvir Singh, 18, of Ladera Ranch, broke into Tesoro High School in Las Flores to steal tests and change their own and others' grades on the school computer network.
  • China denies hacking into US computers

    06/12/2008 11:54:28 AM PDT · by NormsRevenge · 5 replies · 87+ views
    AP on Yahoo ^ | 6/12/08 | AP
    BEIJING - China denied accusations by two U.S. lawmakers that it hacked into congressional computers, saying Thursday that as a developing country it wasn't capable of sophisticated cybercrime. "Is there any evidence? ... Do we have such advanced technology? Even I don't believe it," Foreign Ministry spokesman Qin Gang told a regularly scheduled news conference. Rep. Frank Wolf, R-Va., and New Jersey Rep. Chris Smith, a senior Republican on the House Foreign Affairs Committee, said Wednesday that their office computers were hacked into by people working from China. Both lawmakers, longtime critics of China's human rights record, said the compromised...
  • FBI Fears Chinese Hackers Have Back Door Into US Government & Military

    04/25/2008 4:16:12 AM PDT · by southlake_hoosier · 18 replies · 240+ views
    www.abovetopsecret.com ^ | 4-21-2008 | mister.old.school
    Some months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government security and IT infrastructure. The very-real concern, being investigated by the FBI, is that either the Chinese government or Chinese hackers (or both) have had the benefit of undetectable back-doors into highly secure government and military computer networks for months, perhaps years. The cause: a high-number of counterfeit Cisco routers and switches installed in nearly all government networks that experienced upgrades and/or new units within the past 18 months.
  • Executives harpooned by online 'whalers'

    04/23/2008 6:06:15 AM PDT · by TigerLikesRooster · 6 replies · 201+ views
    Times of London ^ | 04/23/08 | Jonathan Richards
    From Times OnlineApril 23, 2008 Executives harpooned by online 'whalers' Spies and conmen target bosses in e-mail attacks to install malicious software with access to most privileged data Jonathan Richards Corporate bosses have become the latest target of cyber-criminals, after a string of attacks in which senior management have been singled out to receive fraudulent e-mails. Internet fraudsters have taken to sending personally addressed e-mails to chief executives and other high-level executives with a view to installing malicious software on computers that have access to the most privileged company information. In the latest e-mail scam, known as "whaling" because it...
  • Breaking: blog which exposed the Hamdania/Haditha incident is hacked

    04/16/2008 8:38:48 PM PDT · by RaceBannon · 72 replies · 507+ views
    http://euphoricreality.com/ | 04/16/2008 | RaceBannon
    The site of Freeper EUPHORIADEV was hacked. She has lost over 2 years worth of data. Euphoriadev was covering the Haditha and Hamdania incident extensively she has lost over 2 years worth of data we do NOT believe it is the people who are claiming the hack
  • The New E-spionage Threat (CHINA)

    04/14/2008 4:34:47 AM PDT · by Perseverando · 11 replies · 257+ views
    BusinessWeek Magazine ^ | April 10, 2008 | Brian Grow, Keith Epstein and Chi-Chu Tschang
    A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovers startling security gaps The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of computer code known as "Poison Ivy" designed to suck sensitive data out of the $4 billion consulting firm's computer network. The Pentagon hadn't sent the e-mail at all. Its origin is unknown, but the...
  • Gone in 2 minutes: Mac gets hacked first in contest (website-based exploit)

    03/27/2008 2:58:47 PM PDT · by Yossarian · 33 replies · 1,369+ views
    MacWorld ^ | 3/27/08 | Robert McMillan
    Gone in 2 minutes: Mac gets hacked first in contest by Robert McMillan It may be the quickest US$10,000 Charlie Miller ever earned.He took the first of three laptop computers -- and a $10,000 cash prize -- Thursday after breaking into a MacBook Air at the CanSecWest security conference's PWN 2 OWN hacking contest.Show organizers offered a Sony Vaio, Fujitsu U810 and the MacBook as prizes, saying that they could be won by anybody at the show who could find a way to hack into each of them and read the contents of a file on the system, using a...
  • Anonymous hacks CoS anti-Anonymous site

    03/17/2008 9:42:01 PM PDT · by SlapHappyPappy · 5 replies · 470+ views
    It seems Scientology is not all that bright, as if we didn't already know that. Having set up a web site called Anonymous Exposed. You would think they would take extreme measures to ensure its security. After all, Anonymous was formed by a group of skilled computer hackers. But it seems Anonymous has had the last laugh. I'm fairly certain THAT is not the video the CoS wants us to be seeing on that page,
  • Harvard student database hacked, posted on BitTorrent

    03/14/2008 2:01:03 AM PDT · by TigerLikesRooster · 10 replies · 817+ views
    ZDNet Asia ^ | 03/14/08 | Robert Vamosi
    Harvard student database hacked, posted on BitTorrent By Robert Vamosi, CNET News.com Friday, March 14, 2008 12:03 PM Harvard University says about 10,000 of last year's applicants may have had their personal information compromised. At least 6,600 Social Security numbers were exposed. Worse, a compressed 125 M-byte file containing the stolen student data is currently available via BitTorrent, a peer-to-peer network. In a statement published Monday night Harvard officials said the database containing summaries of GSAS applicant data for entry to the Fall 2007 academic year, summaries of GSAS housing applicant data for the 2007-08 and 2006-07 academic years, and...
  • Unauthorized programming must come to an end.

    02/03/2008 11:30:34 AM PST · by Mike Acker · 411 replies · 342+ views
    2008-02-03 | Mike Acker
    Un-authorized programming must come to an end. To argue that "it can't be done" or "it's not cost-effective" is to concede either (a) incompetence, or (b) indifference, or (c) dis-honesty Suggested reading: GEEKONOMICS, David Rice
  • How best to Clean up the Internet

    01/28/2008 7:51:47 AM PST · by Mike Acker · 39 replies · 87+ views
    2008-01-28 | Mike Acker
    How best to Clean up the InternetWe all know this is a job that has be be attended: we have got phishers, pharmers, hackers, bank robbers, sleazes sending out RATS and robots, taking over our computers, stealing our identity, credit cards, bank funds, and birth days, plotting conspiracy, and sending sleazeover OUR networkIn his book "Geekonomics: The Real Cost of Insecure Software" David Rice describes our condition as a "market failure": the current Market Incentives are not producing results most beneficial to society.David rails over "insecure software" and that is certainly a big part of our network troubles today, but...
  • How to hack a Diebold voting machine [image]

    01/10/2008 1:06:00 AM PST · by LibWhacker · 62 replies · 90+ views
  • User Data Stolen From Pornographic Web Sites

    01/04/2008 8:54:01 AM PST · by Calpernia · 32 replies · 250+ views
    Washington Post ^ | Friday, January 4, 2008 | By Keith B. Richburg
    Consumers of Internet pornography who secretly signed up for memberships on adult-oriented Web sites in the past few months may be in for a shock -- some of their personal information, including e-mail addresses, may have been compromised by a security breach. Though the breach, which potentially could affect tens of thousands of customers, reportedly did not involve the theft of credit card information, it could nonetheless have a significant impact on the lucrative Internet pornography industry, according to those who monitor the market. These observers note that online porn relies, as much as anything else, on the promise that...
  • Beijing's Attack on the U.K.

    12/11/2007 12:18:22 AM PST · by Bon mots · 8 replies · 199+ views
    Finextra ^ | December 9, 2007 | David Strachan
    Recent revelations of China's state-sponsored cyber attacks on U.K. financial institutions underscores that strategic financial power is high on Beijing's list of priorities. Moreover, these attacks are consistent with "Unrestricted Warfare," a white paper published in 1999 by two PLA Air Force colonels, Qiao Liang and Wang Xiangsui, in which they argue that future wars will be fought on many fronts, and that in fact economic and financial warfare will become an increasingly necessary and accepted form of conflict. Whether Unrestricted Warfare represents today's official view of China's strategic outlook is unclear. What is clear, however, is that from a...
  • Asymmetric cyber threat

    11/13/2007 11:08:10 AM PST · by JZelle · 81+ views
    The Washington Times ^ | 11-13-07 | James A. Lyons Jr.
    One asymmetric threat to our military forces and the nation is "cyber terrorism." Our advanced technologically based military forces — dependent on our satellites, critical infrastructure computers, the Internet, secure software programming, computer-driven telecommunications, air traffic control centers and other sophisticated sensor systems — are tempting targets for cyber terrorism. Not only do we use our satellite and communication technology to support our military forces, but it has also become a key link in all aspects of our complex economic society. Banking, control of electrical grids, stock markets, telecommunications and a vast array of computer networks are part of our...
  • School: Students hacked computer to change grades, test scores

    11/07/2007 10:44:50 PM PST · by abt87 · 5 replies · 84+ views
    WCAX-TV/ Associated Press ^ | 11/07/2007 | Associated Press
    MANLIUS, N.Y. (AP) - Six students at suburban Syracuse high school and two graduates are accused of hacking into the school's computer system and changing their grades and test scores. Authorities say 6 of the teenagers involved are current students at the school. Of the other two suspects, one attends Syracuse University and the other is a student at John Hopkins University in Baltimore. They're accused of breaking into the school's computers to change their scores on Advance Placement exams, SAT tests and classroom examinations.
  • Taking down terrorist Web sites

    10/30/2007 2:46:16 PM PDT · by 3AngelaD · 9 replies · 157+ views
    Washington Times ^ | October 29, 2007 | James D. Zirin
    Thomas X. Hammes is a retired Marine colonel. He is the author of a seminal book on conducting counter-insurgency warfare. The work is called "The Sling and the Stone: On War in the 21st Century." Recently, he made an intriguing proposal on how to battle jihadists on the Internet (a virtual agora where Islamist militants appear to consort with alarming frequency). This is what he said: "For the last few years, individuals and private organizations that are pro-Israeli have been in a daily fight to shut down or deface anti-Israeli Web sites. Unofficial and informal, this Internet Hagana has had...
  • Hacking Hunter

    10/03/2007 6:35:32 AM PDT · by Calpernia · 28 replies · 374+ views
    Union-Tribune Publishing ^ | October 2, 2007 | Michael Smolens
    WASHINGTON -- Rep. Duncan Hunter's presidential campaign Web site was briefly hacked earlier this week when a starkly anti-war image was posted by an attacker operating from Turkey. The Web site, gohunter08.com, was hijacked either late Sunday or early Monday morning so that visitors were greeted by images of two unhappy-looking children - one peering out between two iron bars with a blood-stained bandage on his head, the other seated on a bleak plateau with a tank in the background. The hacker left an apparent calling card over the graphic - "Hacked by Adnali fOr Turkstorm.Org." Underneath were the words...