Keyword: hacking
-
This is a doozy, even as it's still unverified. According to Anonymous, hacker @Abhaxas just leaked a lengthy text file revealing part of Florida's voter database. Included are voter statistics, candidates, and electoral race data. In the release, Abhaxas writes: So, this is a little ironic. Here is inside details of florida voting systems. Now.. who still believes voting isn't rigged? If the United States Government can't even keep their ballot systems secure, why trust them at all? FAIL!
-
LulzSec the hacker group that has been a thorn in the side of major institutions ranging from Sony to the CIA, says it is going away -- but not quietly. The group said late Saturday it would disband. In what it says is its final act of mayhem, it publicly unloaded a trove of documents containing a significant amount of compressed data. "Our planned 50-day cruise has expired, and we must now sail into the distance...our crew of six wishes you a happy 2011," LulzSec says in its final message. . The group says it chose to end its campaign...
-
A British teenager is suspected of masterminding computer hacking attacks on the CIA, the U.S. Senate and Sony from his bedroom. Ryan Cleary, 19, was arrested at his family’s home in Essex in a dramatic swoop following a joint inquiry by Scotland Yard and the FBI. He was held hours after the UK’s serious crime unit came under online siege from the hacking group known as LulzSec. The group recently declared on Twitter its intention to break into government websites and banks and leak confidential documents.
-
CNN) -- They've breached or busted the websites of the CIA, PBS and the U.S. Senate, and launched at least part of an extended attack on Sony, whose PlayStation Network was brought to a grinding halt for the better part of a month. And, to hear them tell it, it's all for a laugh. Meet Lulz Security, or LulzSec, the gleeful and secretive band of hackers who appear to be responsible for a string of high-profile and sometimes embarrassing Internet attacks. Their most recent strike, and arguably the most ambitious, was a distributed denial-of-service attack Wednesday that shut down the...
-
Chinese Warn Google May Get Punished For Making Country Look Bad Jun 6, 2011 at 8:31am ET by Greg Sterling China is being very defensive. Google’s recent exposure of more attempted Gmail hacking, targeting US government officials and Chinese human-rights activists, has made the Chinese government embarrassed and angry. Suspected state-sponsored Gmail hacking is what initially caused Google to discontinue cooperating with China’s internet censorship policies. Chinese: Google Is a “Political Tool” Last week’s hacking incident and Google’s statements that indirectly point to the government as the source have the Chinese seeing red, so to speak. Claiming that China is...
-
Google wouldn't be human if it weren't relieved that the latest Chinese hacking incident targeted not a hole in Google's defenses but a gullibility of its customers. The proper term is "spear phishing" for the use of email cons to scam a specific, chosen individual into revealing his or her password, allowing unauthorized access to inboxes and online accounts. In a blog post this week, Google announced that the latest attacks seem to come from Jinan, China. The targets were the Gmail accounts of "senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military...
-
After spending the last two days generating more questions than answers, Rep. Anthony Weiner (D-NY) held a press conference this morning to announce that he had nothing more to say. Saying that the “prank has apparently been successful,” Weiner told the media that he had “answered questions extensively … that anyone wanted to put” and that he would have no more to say on the matter of a salacious picture sent out on his Twitter feed: CLICK ABOVE LINK FOR THE VIDEO Funny, most of the media is under the impression that Weiner hasn’t really answered two questions in particular:...
-
In an interview with CBS News Wednesday, New York Democratic Rep. Anthony Weiner repeatedly refused to deny that his crotch is seen in a lewd photograph sent to a college student from his Twitter account. Weiner did say explicitly that he did not send the photo. "I did not, this was a prank, a hoax," he told CBS News' Congressional Correspondent Nancy Cordes. He said his "system was hacked into," noting that "we've retained a firm that is going to take a look at the Internet security that to make sure this does not happen again." Weiner said the firm...
-
Revealed: The glamorous Twitter girls followed by Congressman Weiner as he denies sending lewd picture By Daily Mail Reporter Sent private messages on Twitter to porn star called 'Miss Ginger Lee' Pursued attractive congress worker two days after 9/11 attacks Sponsored a bill in 2008 to give 1,000 visas to foreign models Refuses to answer questions on crotch shot as he hires a lawyer The New York Congressman under fire for allegedly sending a crotch picture to a female student faced fresh controversy today after it emerged he follows a string of glamorous women on Twitter. Anthony Weiner has almost...
-
Lockheed Martin Corp, the world's biggest aerospace company and the Pentagon's No. 1 supplier by sales, has been hit by an unspecified cyber incident, the government said on Saturday. The Department of Homeland Security said it and the Defense Department had offered to help gauge the scope of a "cyber incident impacting LMCO," as the maker of fighter jets, ships and other major weapons systems is known. The U.S. government also has offered to help analyze "available data in order to provide recommendations to mitigate further risk," Chris Ortman, a Homeland Security official, said in an e-mailed reply to a...
-
A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi's cellphone network and re-establish their own communications. The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago. That March cutoff had rebels waving flags to communicate on the battlefield. The new cellphone network, opened on April 2, has become the opposition's main tool for communicating from...
-
Due to the growing list of brands disclosing that they have been compromised as a result of this breach, I’m going to go ahead and tag this as a massive breach. And I only expect it to get bigger as more announcements come out from Epsilon customers. Last night we reported on a breach at marketing services provider, Epsilon, the world’s largest permission-based email marketing provider. Initially we wrote that the breach had affected Kroger, the nation's largest traditional grocery retailer. There is a list of companies at the link (but I don't know if that is going to be...
-
The Future of Dirty Politics? By Ed Hassell Ever since it passed, the national health care law commonly known as ObamaCare has been entangled in legal battles and heated national debate. As polls have consistently shown, a majority of the public remains opposed to the law and many are worried because they never found out what was even in it. While the law has spurred countless news stories, a recent one you may have missed involved the attorney David Rivkin, who successfully led the multi-state challenge to ObamaCare filed in Florida. A prominent conservative voice, Rivkin has been a staunch...
-
Chinese Hackers Access Korea's Global Hawk Purchase Plans Chinese hackers gained access to the government's top-secret plan to buy the U.S.-made Global Hawk reconnaissance drone in June 2010, it emerged Sunday. "We've had a report from a government official that China launched a hacking attack on the Defense Ministry's computer system and accessed confidential information about the ministry's plan" to buy the drone, a spokesman for Democratic Party lawmaker Shin Hak-yong of the National Assembly's Defense Committee said. "The government hasn't raised this issue with China yet and is apparently still mulling how to handle it." Seoul asked Washington to...
-
Someone JUST hacked my craigslist account. I don't have a clue as to how they did it, but they posted four ads in the Westchester, NY area using my craigslist e-mail. Beats my four aces as to how they did it. I've deleted the cell phone ads, changed my password AND changed the receiving e-mail on the account. Does anyone have ANY idea as to how they hacked my craigslist account? Or, has craigslist suffered a major identity theft from its database?
-
On N. Korean heir's birthday, a rude cyber-greeting By Chico Harlan Washington Post Foreign Service Saturday, January 8, 2011; 7:05 AM BEIJING - Apparently breached by hackers, North Korea's official Twitter account on Saturday described leader Kim Jong Il and heir apparent Kim Jong Eun as sworn enemies and called for an uprising to remove them from power. By the time the micro-blogging mischief was over, the North Korean tweets had ranted to its 10,000-plus Twitter followers about profligate nuclear weapons spending and lavish Kim Jong Il drinking parties - hosted "while 3 million people are starving and freezing to...
-
The WikiLeakers and the Bathrobe Brigades now launching hack attacks from their parents' basements are not free speech heroes, they are leftwing collectivists lashing out at all they hate: America, Capitalism, and of course, Sarah Palin. Socialism Advances Behind a Screen of BS The Palin attack is what revealed their true colors. What does she have to do with the free flow of information? How does stealing her and Todd's credit cards advance the cause of an open society? Many of these hackers are society’s losers. They are unsuccessful, so they hate society. They lack the skills and self-discipline...
-
Introduction: How often do you go to the store on a monthly basis? Maybe you go down to the local Starbucks every morning before work. This is prime hunting ground for an attacker to steal all of your credit card information without ever touching you, using equipment they got on ebay for under $20. These are the threats that credit card companies and the thieves don’t want you to know about. RFID hacking has been in the news quite a bit lately. There’s a lot of concern as to what it involves, how easy it is, and what exactly RFID...
-
Recently a high school in Pennsylvania shocked the nation when it became the subject of a lawsuit alleging that webcams in school-issued laptop computers were being remotely activated by school staff, used to snap photos of students in their homes. As a computer security professional I dug into the story with the help of my colleagues, and together we found that the networked webcam capability built into these computers by the school district was absolutely real. Our findings were greeted with surprise and dismay; they have caused a nationwide outcry. The truth is, this shouldn't have been a surprise. America...
-
The first question some may ask is “Why?” Those of us who are LED addicts say “Why the hell not?” This guy literally took 500 bright white LEDs and created his own giant 50W flashlight. While it may have been just ever so slightly overkill, it’s still an impressive build. Can you imagine soldering all of those 500 LEDs?! Don’t Miss: DIY Super-Powered Flashlight Beam****************************************************************************Youtube Video of the Construction and Demostration at the website.... *********************************************************************************** As you can tell in the video above, it has an absurd amount of controls for various brightness settings. Heck, it could even be a...
|
|
|