Free Republic 4th Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $33,032
40%  
Woo hoo!! And now only $178 to reach 41%!! Thank you all very much!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • DOJ to investigate Palin Email Breach

    09/17/2008 1:14:57 PM PDT · by Perdogg · 57 replies · 322+ views
    Macsmind ^ | 09.17.08 | MacRanger
    Per a contact with the DOJ, an investigation will begin into the group who hacked into Sarah Palin’s email and posted messages on the internet. Intercept of private email communication - even of a public figure - is a federal offense. Not only can the original hackers be charged, but all those who posted the messages as well. The website Gawker may be in further trouble for going beyond the email to post pics from the Palin’s personal message box, as well as other personal information that may be afoul of laws dealing with identity theft.
  • Large Hadron Collider hacked

    09/16/2008 3:56:41 AM PDT · by Renfield · 30 replies · 281+ views
    A group of Greek hackers broke into the particle accelerator's systems just as scientists were turning it on in front of the world's media Monday, 15th September 2008 Even as the scientists at CERN, the centre for nuclear research, were switching on the Large Hadron Collider (LHC) particle accelerator under Geneva last week, a group of Greek hackers were one step away from controlling a 12,500-ton electromagnet that serves as one of the machine’s four detectors. The intruders posted a lengthy note in Greek on the machine’s network introducing themselves as ‘the Greek Security Team’, mocking the system’s poor security...
  • Threat Matrix: August 2008

    08/01/2008 12:17:04 PM PDT · by nwctwx · 1,066 replies · 8,561+ views
    Pentagon Makes Fighting Extremism Top Priority Seven years after the Sept. 11 attacks, the Pentagon on Thursday officially named "the long war" against global extremism as its top priority and pledged to avert any conventional military threat from China or Russia through dialogue. The Defense Department, in a new national defense strategy, also emphasized the need to subordinate military operations to "soft power" initiatives to undermine Islamist militancy by promoting economic, political and social development in vulnerable corners of the world. Defense Secretary Robert Gates said he hoped the change would help establish permanent institutional support for counterinsurgency skills...
  • Patch in Internet's DNS no guarantee against attacks

    08/11/2008 12:22:34 PM PDT · by smokingfrog · 4 replies · 152+ views
    Computerworld ^ | August 11, 2008 | Gregg Keizer
    Russian researcher claims vulnerabilities can be exploited in less than a day, but others disagree... Patches meant to fix a flaw in the Internet's Domain Name System (DNS) don't completely protect the Web's traffic cop from attack, a Russian research claimed Friday. The head of the non-profit that maintains the most commonly used DNS software, however, said there was little to worry about. In a blog post , Russian researcher Evgeniy Polyakov said he had created an exploit able to insert bogus routing information into systems running the most-up-to-date version of BIND (Berkeley Internet Name Domain), the popular open-source software...
  • Marisel Garcia Caught in Webcam Spy Hacker Craig Feigin Case

    08/07/2008 1:34:05 PM PDT · by Schnucki · 11 replies · 680+ views
    Marisel Garcia is one of eight or nine women in the Gainesville, Florida who is a victim of a Webcam Spy Hacker voyeurism scandal, orchestrated by Craig Feigin. Craig Feigin, a computer programmer, worked on Marisel Garcia's computer to fix her laptop. When she got her machine back from Feigin, it had a slew of other problems so she brought it to another area repair man. One of the new problems was that the computer's built-in camera light came on every time she was near the machine. When Marisel Garcia got her computer back, she learned that Craig Feigin had...
  • Russian Gang Hijacking PCs in Vast Scheme

    08/06/2008 12:00:14 PM PDT · by Perseverando · 9 replies · 558+ views
    The New York Times ^ | August 5, 2008 | John Markoff
    A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. The new form of attack indicates that little progress has been made in defusing the threat of botnets, networks of infected computers that criminals use to send spam, steal passwords and do other forms of damage, according to computer security investigators. Several security experts say that although attacks against network administrators are not new, the systematic use of administrative software to spread malicious software...
  • Macsmind Hacking UPDATE(Hacking traced to Obama IP)

    08/04/2008 5:52:32 AM PDT · by SE Mom · 26 replies · 278+ views
    MacsMind ^ | 2 August 2008 | MacRanger
    Confederate Yankee notes further possible examples by Obama supporters getting Google to suspend sites for “Terms of Service” violations. Instapundit tries to douse the theories, but here is one fact that can’t be explained away. On July 22-25 Macsmind was DOS’d (Denial of Service) that originated from three IP addresses that are assigned to Barack Obama’s website. This isn’t a theory but was confirmed via law enforcement through an inspection of the site logs from those dates. The IP address in question; 66.39.4.254 66.39.143.229 216.146.206.181, are all registered via “Go Daddy” under the name barackobama.com. On those dates, beginning at...
  • Dutch university can publish controversial Oyster research

    07/20/2008 12:29:47 AM PDT · by Schnucki · 10 replies · 241+ views
    The Register ^ | July 18, 2008 | Jan Libbenga
    Dutch researchers will be able to publish their controversial report on the Mifare Classic (Oyster) RFID chip in October, a Dutch judge ruled today. Researchers from Radboud University in Nijmegen revealed two weeks ago they had cracked and cloned London's Oyster travelcard and the Dutch public transportation travelcard, which is based on the same RFID chip. Attackers can scan a card reading unit, collect the cryptographic key that protects security and upload it to a laptop. Details are then transferred to a blank card, which can be used for free travel. Around one billion of these cards have been sold...
  • California Teenagers Face Prison for Hacking Into School Computers

    06/20/2008 9:13:52 PM PDT · by Amelia · 26 replies · 153+ views
    Fox News ^ | Friday, June 20, 2008 | Paul Wagenseil
    County prosecutors allege Omar Khan, 18, of Coto de Caza, and Tanvir Singh, 18, of Ladera Ranch, broke into Tesoro High School in Las Flores to steal tests and change their own and others' grades on the school computer network.
  • China denies hacking into US computers

    06/12/2008 11:54:28 AM PDT · by NormsRevenge · 5 replies · 87+ views
    AP on Yahoo ^ | 6/12/08 | AP
    BEIJING - China denied accusations by two U.S. lawmakers that it hacked into congressional computers, saying Thursday that as a developing country it wasn't capable of sophisticated cybercrime. "Is there any evidence? ... Do we have such advanced technology? Even I don't believe it," Foreign Ministry spokesman Qin Gang told a regularly scheduled news conference. Rep. Frank Wolf, R-Va., and New Jersey Rep. Chris Smith, a senior Republican on the House Foreign Affairs Committee, said Wednesday that their office computers were hacked into by people working from China. Both lawmakers, longtime critics of China's human rights record, said the compromised...
  • FBI Fears Chinese Hackers Have Back Door Into US Government & Military

    04/25/2008 4:16:12 AM PDT · by southlake_hoosier · 18 replies · 240+ views
    www.abovetopsecret.com ^ | 4-21-2008 | mister.old.school
    Some months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government security and IT infrastructure. The very-real concern, being investigated by the FBI, is that either the Chinese government or Chinese hackers (or both) have had the benefit of undetectable back-doors into highly secure government and military computer networks for months, perhaps years. The cause: a high-number of counterfeit Cisco routers and switches installed in nearly all government networks that experienced upgrades and/or new units within the past 18 months.
  • Executives harpooned by online 'whalers'

    04/23/2008 6:06:15 AM PDT · by TigerLikesRooster · 6 replies · 201+ views
    Times of London ^ | 04/23/08 | Jonathan Richards
    From Times OnlineApril 23, 2008 Executives harpooned by online 'whalers' Spies and conmen target bosses in e-mail attacks to install malicious software with access to most privileged data Jonathan Richards Corporate bosses have become the latest target of cyber-criminals, after a string of attacks in which senior management have been singled out to receive fraudulent e-mails. Internet fraudsters have taken to sending personally addressed e-mails to chief executives and other high-level executives with a view to installing malicious software on computers that have access to the most privileged company information. In the latest e-mail scam, known as "whaling" because it...
  • Breaking: blog which exposed the Hamdania/Haditha incident is hacked

    04/16/2008 8:38:48 PM PDT · by RaceBannon · 72 replies · 507+ views
    http://euphoricreality.com/ | 04/16/2008 | RaceBannon
    The site of Freeper EUPHORIADEV was hacked. She has lost over 2 years worth of data. Euphoriadev was covering the Haditha and Hamdania incident extensively she has lost over 2 years worth of data we do NOT believe it is the people who are claiming the hack
  • The New E-spionage Threat (CHINA)

    04/14/2008 4:34:47 AM PDT · by Perseverando · 11 replies · 257+ views
    BusinessWeek Magazine ^ | April 10, 2008 | Brian Grow, Keith Epstein and Chi-Chu Tschang
    A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovers startling security gaps The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of computer code known as "Poison Ivy" designed to suck sensitive data out of the $4 billion consulting firm's computer network. The Pentagon hadn't sent the e-mail at all. Its origin is unknown, but the...
  • Gone in 2 minutes: Mac gets hacked first in contest (website-based exploit)

    03/27/2008 2:58:47 PM PDT · by Yossarian · 33 replies · 1,369+ views
    MacWorld ^ | 3/27/08 | Robert McMillan
    Gone in 2 minutes: Mac gets hacked first in contest by Robert McMillan It may be the quickest US$10,000 Charlie Miller ever earned.He took the first of three laptop computers -- and a $10,000 cash prize -- Thursday after breaking into a MacBook Air at the CanSecWest security conference's PWN 2 OWN hacking contest.Show organizers offered a Sony Vaio, Fujitsu U810 and the MacBook as prizes, saying that they could be won by anybody at the show who could find a way to hack into each of them and read the contents of a file on the system, using a...
  • Anonymous hacks CoS anti-Anonymous site

    03/17/2008 9:42:01 PM PDT · by SlapHappyPappy · 5 replies · 470+ views
    It seems Scientology is not all that bright, as if we didn't already know that. Having set up a web site called Anonymous Exposed. You would think they would take extreme measures to ensure its security. After all, Anonymous was formed by a group of skilled computer hackers. But it seems Anonymous has had the last laugh. I'm fairly certain THAT is not the video the CoS wants us to be seeing on that page,
  • Harvard student database hacked, posted on BitTorrent

    03/14/2008 2:01:03 AM PDT · by TigerLikesRooster · 10 replies · 817+ views
    ZDNet Asia ^ | 03/14/08 | Robert Vamosi
    Harvard student database hacked, posted on BitTorrent By Robert Vamosi, CNET News.com Friday, March 14, 2008 12:03 PM Harvard University says about 10,000 of last year's applicants may have had their personal information compromised. At least 6,600 Social Security numbers were exposed. Worse, a compressed 125 M-byte file containing the stolen student data is currently available via BitTorrent, a peer-to-peer network. In a statement published Monday night Harvard officials said the database containing summaries of GSAS applicant data for entry to the Fall 2007 academic year, summaries of GSAS housing applicant data for the 2007-08 and 2006-07 academic years, and...
  • Unauthorized programming must come to an end.

    02/03/2008 11:30:34 AM PST · by Mike Acker · 411 replies · 342+ views
    2008-02-03 | Mike Acker
    Un-authorized programming must come to an end. To argue that "it can't be done" or "it's not cost-effective" is to concede either (a) incompetence, or (b) indifference, or (c) dis-honesty Suggested reading: GEEKONOMICS, David Rice
  • How best to Clean up the Internet

    01/28/2008 7:51:47 AM PST · by Mike Acker · 39 replies · 87+ views
    2008-01-28 | Mike Acker
    How best to Clean up the InternetWe all know this is a job that has be be attended: we have got phishers, pharmers, hackers, bank robbers, sleazes sending out RATS and robots, taking over our computers, stealing our identity, credit cards, bank funds, and birth days, plotting conspiracy, and sending sleazeover OUR networkIn his book "Geekonomics: The Real Cost of Insecure Software" David Rice describes our condition as a "market failure": the current Market Incentives are not producing results most beneficial to society.David rails over "insecure software" and that is certainly a big part of our network troubles today, but...
  • How to hack a Diebold voting machine [image]

    01/10/2008 1:06:00 AM PST · by LibWhacker · 62 replies · 90+ views