Free Republic 4th Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $32,806
40%  
Woo hoo!! And now only $404 to reach 41%!! Thank you all very much!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • Rebels Hijack Gadhafi's Phone Network

    04/14/2011 10:05:24 AM PDT · by bigbob · 2 replies
    WSJ Online ^ | 4-13-11 | MARGARET COKER and CHARLES LEVINSON
    A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi's cellphone network and re-establish their own communications. The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago. That March cutoff had rebels waving flags to communicate on the battlefield. The new cellphone network, opened on April 2, has become the opposition's main tool for communicating from...
  • Massive Breach at Epsilon Compromises Customer Lists of Major Brands

    04/02/2011 8:46:19 PM PDT · by brytlea · 48 replies
    Security Week ^ | April 2, 2011 | Mike Lennon
    Due to the growing list of brands disclosing that they have been compromised as a result of this breach, I’m going to go ahead and tag this as a massive breach. And I only expect it to get bigger as more announcements come out from Epsilon customers. Last night we reported on a breach at marketing services provider, Epsilon, the world’s largest permission-based email marketing provider. Initially we wrote that the breach had affected Kroger, the nation's largest traditional grocery retailer. There is a list of companies at the link (but I don't know if that is going to be...
  • Conservatives are in crosshairs of today's "hacktivists"

    The Future of Dirty Politics? By Ed Hassell Ever since it passed, the national health care law commonly known as ObamaCare has been entangled in legal battles and heated national debate. As polls have consistently shown, a majority of the public remains opposed to the law and many are worried because they never found out what was even in it. While the law has spurred countless news stories, a recent one you may have missed involved the attorney David Rivkin, who successfully led the multi-state challenge to ObamaCare filed in Florida. A prominent conservative voice, Rivkin has been a staunch...
  • Chinese Hackers Access Korea's Global Hawk Purchase Plans

    03/07/2011 5:36:56 AM PST · by TigerLikesRooster · 2 replies
    Chosun Ilbo ^ | 03/07/11
    Chinese Hackers Access Korea's Global Hawk Purchase Plans Chinese hackers gained access to the government's top-secret plan to buy the U.S.-made Global Hawk reconnaissance drone in June 2010, it emerged Sunday. "We've had a report from a government official that China launched a hacking attack on the Defense Ministry's computer system and accessed confidential information about the ministry's plan" to buy the drone, a spokesman for Democratic Party lawmaker Shin Hak-yong of the National Assembly's Defense Committee said. "The government hasn't raised this issue with China yet and is apparently still mulling how to handle it." Seoul asked Washington to...
  • Someone just hacked my craigslist account

    02/07/2011 8:26:40 PM PST · by MeneMeneTekelUpharsin · 30 replies · 1+ views
    craigslist.org | 07 September 2011
    Someone JUST hacked my craigslist account. I don't have a clue as to how they did it, but they posted four ads in the Westchester, NY area using my craigslist e-mail. Beats my four aces as to how they did it. I've deleted the cell phone ads, changed my password AND changed the receiving e-mail on the account. Does anyone have ANY idea as to how they hacked my craigslist account? Or, has craigslist suffered a major identity theft from its database?
  • On N. Korean heir's birthday, a rude cyber-greeting

    01/08/2011 5:11:43 AM PST · by TigerLikesRooster · 11 replies
    WP ^ | 01/08/11 | Chico Harlan
    On N. Korean heir's birthday, a rude cyber-greeting By Chico Harlan Washington Post Foreign Service Saturday, January 8, 2011; 7:05 AM BEIJING - Apparently breached by hackers, North Korea's official Twitter account on Saturday described leader Kim Jong Il and heir apparent Kim Jong Eun as sworn enemies and called for an uprising to remove them from power. By the time the micro-blogging mischief was over, the North Korean tweets had ranted to its 10,000-plus Twitter followers about profligate nuclear weapons spending and lavish Kim Jong Il drinking parties - hosted "while 3 million people are starving and freezing to...
  • WikiLeakers are America-hating Nihilists

    12/20/2010 11:00:47 AM PST · by Silverfiddle · 2 replies
    Western Hero ^ | 20 December 2010 | Silverfiddle
    The WikiLeakers and the Bathrobe Brigades now launching hack attacks from their parents' basements are not free speech heroes, they are leftwing collectivists lashing out at all they hate:  America, Capitalism, and of course, Sarah Palin. Socialism Advances Behind a Screen of BS The Palin attack is what revealed their true colors. What does she have to do with the free flow of information? How does stealing her and Todd's credit cards advance the cause of an open society? Many of these hackers are society’s losers. They are unsuccessful, so they hate society. They lack the skills and self-discipline...
  • RFID Hacking: Is It A Threat?

    10/14/2010 11:32:35 AM PDT · by ShadowAce · 16 replies
    Techware Labs ^ | 13 October 2010 | Chris
    Introduction: How often do you go to the store on a monthly basis? Maybe you go down to the local Starbucks every morning before work. This is prime hunting ground for an attacker to steal all of your credit card information without ever touching you, using equipment they got on ebay for under $20. These are the threats that credit card companies and the thieves don’t want you to know about. RFID hacking has been in the news quite a bit lately. There’s a lot of concern as to what it involves, how easy it is, and what exactly RFID...
  • <b>Where Have All the Hackers Gone?</b>

    10/03/2010 7:30:05 PM PDT · by cycjec · 10 replies
    Stryde Hax ^ | March 2010 | Stryde Hax
    Recently a high school in Pennsylvania shocked the nation when it became the subject of a lawsuit alleging that webcams in school-issued laptop computers were being remotely activated by school staff, used to snap photos of students in their homes. As a computer security professional I dug into the story with the help of my colleagues, and together we found that the networked webcam capability built into these computers by the school district was absolutely real. Our findings were greeted with surprise and dismay; they have caused a nationwide outcry. The truth is, this shouldn't have been a surprise. America...
  • Massive 500-LED Extreme Flashlight ( Homemade with controls)

    09/07/2010 12:00:42 PM PDT · by Ernest_at_the_Beach · 54 replies
    hacknmod.com ^ | March 2010
    The first question some may ask is “Why?”  Those of us who are LED addicts say “Why the hell not?”  This guy literally took 500 bright white LEDs and created his own giant 50W flashlight.  While it may have been just ever so slightly overkill, it’s still an impressive build.  Can you imagine soldering all of those 500 LEDs?! Don’t Miss: DIY Super-Powered Flashlight Beam****************************************************************************Youtube Video of the Construction and Demostration at the website.... *********************************************************************************** As you can tell in the video above, it has an absurd amount of controls for various brightness settings.  Heck, it could even be a...
  • College student found guilty of hacking into Sarah Palin's personal e-mail account

    05/03/2010 11:24:32 AM PDT · by Syncro · 41 replies · 1,928+ views
    metro.co.uk ^ | May 3rd , 2010 | METRO REPORTER
    College student found guilty of hacking into Sarah Palin's personal e-mail account A college student has been found guilty of hacking into former Republican vice-presidential candidate Sarah Palin's personal e-mail and posting some of the contents online. College student David Kernell has been found guilty of hacking into Sarah Palin's e-mail A jury decided 22-year-old David Kernell was guilty of obstruction of justice and unauthorised access of a computer, though he was cleared of a wire fraud charge.In a statement issued on her Facebook page, Palin thanked the jury and prosecutors and explained the case's importance: "Besides the obvious invasion...
  • Jury convicts Palin e-mail intruder on two counts

    04/30/2010 12:21:13 PM PDT · by SmithL · 66 replies · 2,610+ views
    KNOXVILLE — A federal jury this afternoon convicted Sarah Palin e-mail intruder David C. Kernell of felony destruction of records to hamper a federal investigation and misdemeanor unlawfully obtaining information from a protected computer. The jury acquitted Kernell, 22, of wire fraud. It remains deadlocked on felony identity theft. It’s unclear if U.S. District Judge Thomas W. Phillips will order the jurors, in their fourth day of deliberations, to continue.
  • Judge presents 'dynamite charge' to stuck Palin e-mail jurors

    04/30/2010 7:56:15 AM PDT · by SmithL · 110 replies · 2,695+ views
    KNOXVILLE - Jurors in the trial of accused Sarah Palin e-mail intruder David C. Kernell were this morning urged to reach a complete verdict in the case. The jurors began their fourth day of deliberations by hearing a special added instruction from U.S. District Judge Thomas W. Phillips. Called an Allen charge in legal parlance, it is commonly called "a dynamite charge." Phillips told the jurors that as they resume deliberating they should each reconsider their positions, but there was no need to rush to a verdict. The jurors reported shortly before 9 a.m. and then retired to resume deliberations...
  • Defendant in Palin hacking case won't testify

    04/26/2010 8:31:26 AM PDT · by libstripper · 38 replies · 1,986+ views
    Associated Press ^ | April 26, 2010 | Associated Press
    KNOXVILLE, Tenn. -- The attorney for a former University of Tennessee student charged with hacking Sarah Palin's e-mail says the defendant will not testify in his federal trial in Knoxville.
  • Hacker busts IE8 on Windows 7 in 2 minutes

    03/26/2010 10:24:27 AM PDT · by ShadowAce · 11 replies · 610+ views
    ComputerWorld ^ | 25 March 2010 | Gregg Keizer
    Two researchers yesterday won $10,000 each at the Pwn2Own hacking contest by bypassing important security measures of Windows 7. Both Peter Vreugdenhil of the Netherlands and a German researcher who would only identify himself by the first name Nils found ways to disable DEP (data execution prevention) and ASLR (address space layout randomization), which are two of Windows 7's most vaunted anti-exploit features. Each contestant faced down the fully-patched 64-bit version of Windows 7 and came out a winner. Vreugdenhil used a two-exploit combination to circumvent first ASLR and then DEP to successfully hack IE8. A half-hour later, Nils bypassed...
  • Iran Hacks Opposition Web Sites, Arrests Cyber Activists

    03/15/2010 12:54:40 AM PDT · by nickcarraway · 317+ views
    PCWorld ^ | March 14, 2010 | Sumner Lemon
    Iran's Islamic Revolutionary Guards Corps hacked into 29 Web sites affiliated with U.S. espionage networks, Iran's semi-official Fars News Agency reported on Sunday. "The hacked websites acted against Iran's national security under the cover of human rights activities," Fars reported. It did not disclose details of the attacks. The 29 Web sites were identified in a statement (in Farsi) released on a Web site operated by the Revolutionary Guards. The Internet has been used by Iranian opposition groups who contested the results of last year's elections there to organize demonstrations and share information about protests and arrests. The Revolutionary Guards...
  • Hacking for Fun and Profit in China’s Underworld

    02/02/2010 1:33:56 AM PST · by Cheap_Hessian · 5 replies · 595+ views
    The New York Times ^ | February 1, 2010 | David Barboza
    CHANGSHA, China — With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. “Here’s a list of the people who’ve been infected with my Trojan horse,” he says, working from a dingy apartment on the outskirts of this city in central China. “They don’t even know what’s happened.” As he explains it, an online “trapdoor” he created just over a week ago has already lured 2,000 people from China and overseas — people who clicked on something they should not have, inadvertently spreading a virus that allows...
  • Experts: US gov't needs to prepare for cyberwar (no more nice guy to Chicom?)

    01/28/2010 10:03:50 AM PST · by TigerLikesRooster · 1 replies · 236+ views
    Network World ^ | 01/27/10 | Grant Gross
    Experts: US gov't needs to prepare for cyberwar Cyberwar is difficult to define, but the U.S. needs a strategy, a group of experts says By Grant Gross, IDG News Service January 27, 2010 04:31 PM ET Sponsored by: The U.S. government needs to figure out how it will respond to acts of cyberwar, as foreign governments increasingly look to gain advantages in cyberspace, a group of cybersecurity experts said Wednesday. One problem, however, is that there wasn't consensus among the panelists on what exactly constitutes an act of war in cyberspace. The U.S. military has used cyberattacks to disrupt enemy...
  • U.S. enables Chinese hacking of Google

    01/26/2010 2:27:09 PM PST · by flamefront · 4 replies · 340+ views
    cnn ^ | 23 Jan 2010 | Bruce Schneier
    U.S. enables Chinese hacking of Google STORY HIGHLIGHTS Google says hackers from China got into its Gmail systemBruce Schneier says hackers exploited feature put into system at behest of U.S. governmentWhen governments get access to private communications, they invite abuse, he saysGovernment surveillance and control of Internet is flourishing, he says : Bruce Schneier is a security technologist and author of "Beyond Fear: Thinking Sensibly About Security in an Uncertain World." Read more of his writing at www.schneier.com. -- Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such...
  • Safety First for IT executives in China (Govt Warns Symantec CTO of 'Evil Maid' Virus)

    01/09/2010 10:59:17 AM PST · by nickcarraway · 4 replies · 640+ views
    CRN ^ | Sep 16, 2009 | Sholto Macpherson
    US Government recommends weighing laptop before and after each visit. Senior executives in US IT companies have been advised by the US Government to follow extremely strict policies for visits to China which extend far beyond standard software protection. The policies encourage them to leave their standard IT equipment at home and to buy separate gear only for use in China. Mark Bregman, chief technology officer at security firm Symantec said he left his MacBook Pro behind in the US and took his MacBook Air whenever he flew to China. Bregman said he only ever used the Air in China...