Tag archive: "hacking"

darpa-hacks-car-remote-prius

DARPA Hackers Show How Cars Can Be Remotely Controlled

Archive

Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need ...

11-21

November 21, 2012 – DCMX Radio: Anonymous on Gaza & Israel War Crimes, AT&T iPad Conviction, Blackwater CEO’s New Biz, Random Headlines, Uruguay President Charity

MaxMaverick

Anonymous statements on Gaza / Israel Conflict & Ceasefire

Security researcher Andrew Aurenheimer found guilty of conspiracy and identity ...

Gary-McKinnon

Are Aliens Real? Hacker Gary McKinnon Says Evidence is in Military Computers, US Seeks Extradition

Archive

Are aliens real? One hacker who broke into US Military computers says yes, claiming that he found evidence of extraterrestrial ...

10-2

October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation

MaxMaverick

DCMX Sound Effects Update~  Tribute to K-Rino with ‘Grand Deception’

National Detention Authorization Act (NDAA) Appeals Court Update ...

blackhat_hackers

Sell Out Hackers: The Zero-Day Exploit Market

Archive

Exploit sellers arm governments and businesses, but are they harming security for everyone else?

Remember the final battle scene in ...

Barrett_Brown_Communiqe_Prison_TX

Barrett Brown – Communiqué from Prison 9/20/12

Archive

It is hard for me to express how much I appreciate your letter, which is the first I have ...

anonmymous_Iphone

Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

Archive

 

Anonymous has a way of releasing massive collections of information that raise many more questions than they answer.

Case ...

Laptop and Mobile Phone

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

Archive

In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the ...

drone-hacked-with-spoofing

Pwn The Drones: Investigative Research into Drone Technology, Vulnerabilities, Exploits, Future

Archive

EFF activists Trevor Timm and Parker Higgins explain how widespread drones are becoming, how they’ve already been hacked, and ...

flame_virus_Stuxnet_Israel_cia

Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape

Archive

Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies ...

Digital_Security

VPN vs. SSH Tunnel: Which Is More Secure?

Archive

VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, ...

th3j35t3r_Tom_Ryan_Blog

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

Archive

UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently:

I remember seeing IRC logs of you ...

Windows_7_Under_Surveillance

How NSA access was built into Windows

Archive

Careless mistake reveals subversion of Windows by NSA.

A CARELESS mistake by Microsoft programmers has revealed that special access ...

Anonymous_Mirage

Is Anonymous The Internet’s Most Powerful Mirage?

Archive

You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency.

Supporters of the ...

windowsXP_hack

Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP

Archive

In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will ...

iran-exhibits-captured-US-drone

Iran Decodes US Drone Intel

Archive

TEHRAN (FNA)- Senior Iranian military officials announced that the country’s experts have decoded the intelligence gathering system and memory hard ...

250px-IPhone_3G

Here’s How Law Enforcement Cracks Your iPhone’s Security Code

Archive

Update: I’ve clarified two aspects of this story below. First, Micro Systemation’s XRY tool often requires more than two minutes ...

anonymous

Anonymous reveals Haditha massacre emails

Archive

Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank ...

Main Menu

Disclaimer & Fair Use
This website may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in efforts to advance the understanding of humanity's challenges and ideally to help uncover valid, achievable solutions for those challenges [self-imposed evolutionary limitations]. This website preserves & archives valuable information that is now more often being censored or wiped from its original source. Thus, we find this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Reading the articles posted on this website represents such a request for information. Consistent with this notice you are welcome to make 'fair use' of anything you find in the archives. However, if you wish to use copyrighted material from this website for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. You can read more about 'fair use' and US Copyright Law at the Legal Information Institute of Cornell Law School.