Tag archive: "hacking"


DARPA Hackers Show How Cars Can Be Remotely Controlled


Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need ...


November 21, 2012 – DCMX Radio: Anonymous on Gaza & Israel War Crimes, AT&T iPad Conviction, Blackwater CEO’s New Biz, Random Headlines, Uruguay President Charity


Anonymous statements on Gaza / Israel Conflict & Ceasefire

Security researcher Andrew Aurenheimer found guilty of conspiracy and identity ...


Are Aliens Real? Hacker Gary McKinnon Says Evidence is in Military Computers, US Seeks Extradition


Are aliens real? One hacker who broke into US Military computers says yes, claiming that he found evidence of extraterrestrial ...


October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation


DCMX Sound Effects Update~  Tribute to K-Rino with ‘Grand Deception’

National Detention Authorization Act (NDAA) Appeals Court Update ...


Sell Out Hackers: The Zero-Day Exploit Market


Exploit sellers arm governments and businesses, but are they harming security for everyone else?

Remember the final battle scene in ...


Barrett Brown – Communiqué from Prison 9/20/12


It is hard for me to express how much I appreciate your letter, which is the first I have ...


Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI



Anonymous has a way of releasing massive collections of information that raise many more questions than they answer.

Case ...

Laptop and Mobile Phone

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones


In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the ...


Pwn The Drones: Investigative Research into Drone Technology, Vulnerabilities, Exploits, Future


EFF activists Trevor Timm and Parker Higgins explain how widespread drones are becoming, how they’ve already been hacked, and ...


Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape


Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies ...


VPN vs. SSH Tunnel: Which Is More Secure?


VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, ...


#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog


UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently:

I remember seeing IRC logs of you ...


How NSA access was built into Windows


Careless mistake reveals subversion of Windows by NSA.

A CARELESS mistake by Microsoft programmers has revealed that special access ...


Is Anonymous The Internet’s Most Powerful Mirage?


You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency.

Supporters of the ...


Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP


In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will ...


Iran Decodes US Drone Intel


TEHRAN (FNA)- Senior Iranian military officials announced that the country’s experts have decoded the intelligence gathering system and memory hard ...


Here’s How Law Enforcement Cracks Your iPhone’s Security Code


Update: I’ve clarified two aspects of this story below. First, Micro Systemation’s XRY tool often requires more than two minutes ...


Anonymous reveals Haditha massacre emails


Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank ...

Main Menu

Disclaimer & Fair Use
This website may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in efforts to advance the understanding of humanity's challenges and ideally to help uncover valid, achievable solutions for those challenges [self-imposed evolutionary limitations]. This website preserves & archives valuable information that is now more often being censored or wiped from its original source. Thus, we find this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Reading the articles posted on this website represents such a request for information. Consistent with this notice you are welcome to make 'fair use' of anything you find in the archives. However, if you wish to use copyrighted material from this website for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. You can read more about 'fair use' and US Copyright Law at the Legal Information Institute of Cornell Law School.