Tag: Hacking

  • Adam Bennett Anon

    Adam Bennett Anon

    Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article). Everybody who has known Adam ‘Lorax’ Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as an experienced life saver and a fundraising manager for Cancer…

  • Aaron Swartz – Programmer, Activist

    Aaron Swartz – Programmer, Activist

    Aaron Swartz was a computer programmer and Internet activist who is often referred to as the third founder of Reddit. “”I don’t think I have any particular technical skills. I just got a really large head start.”” -Aaron Swartz Early Years Aaron Swartz was born on November 8, 1986, in Chicago. Precocious from the start,…

  • Mysterious Shadow Hackers: The Equation Group

    Mysterious Shadow Hackers: The Equation Group

    An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos of herself and her colleagues snapped…

  • Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

    Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

    AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated…

  • Barrett Brown – Journalist, Activist

    Barrett Brown – Journalist, Activist

    Barrett Brown is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes. He is credited with the creation of Project PM, a research outfit and information collective determined to expose agents of the corporate military spying apparatus. Brown’s large vocabulary and…

  • YTCracker – Hacker, Rapper, Activist

    YTCracker – Hacker, Rapper, Activist

    Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17. Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the…

  • Christopher Doyon – Hacker

    Christopher Doyon – Hacker

    Christopher Doyon Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the…

  • Gary McKinnon – Hacker

    Gary McKinnon – Hacker

    Gary McKinnon (born 10 February 1966) is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the “biggest military computer hack of all time,”[2] although McKinnon himself – who has a diagnosis of Asperger’s Syndrome – states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other…

  • Recommendations for the Hacktivist Community

    Recommendations for the Hacktivist Community

    Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us define a “hacker” as someone who utilizes their knowledge of computers…

  • Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers

    Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers

      –[ 1 ]– Introduction I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have…

  • DARPA Hackers Show How Cars Can Be Remotely Controlled

    DARPA Hackers Show How Cars Can Be Remotely Controlled

    Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer for Twitter. These two security researchers…

  • November 21, 2012 – DCMX Radio:  Anonymous on Gaza & Israel War Crimes, AT&T iPad Conviction, Blackwater CEO’s New Biz, Random Headlines, Uruguay President Charity

    November 21, 2012 – DCMX Radio: Anonymous on Gaza & Israel War Crimes, AT&T iPad Conviction, Blackwater CEO’s New Biz, Random Headlines, Uruguay President Charity

    Anonymous statements on Gaza / Israel Conflict & Ceasefire Security researcher Andrew Aurenheimer found guilty of conspiracy and identity fraud in ‘hackless’ AT&T iPad breach Ex-navy SEAL & War Criminal Erik Prince sets trail for Chinese & International Investors into Africa RANDOM QUICK HEADLINES Uruguay President, Jose Mujica, Donates Most Of His Pay To Charity…

  • Are Aliens Real? Hacker Gary McKinnon Says Evidence is in Military Computers, US Seeks Extradition

    Are Aliens Real? Hacker Gary McKinnon Says Evidence is in Military Computers, US Seeks Extradition

    Are aliens real? One hacker who broke into US Military computers says yes, claiming that he found evidence of extraterrestrial life in the computer networks he broke into. Now, the United States is seeking extradition for breaching both military and NASA computer networks. However, the UK says that he isn’t fit to stand trial and…

  • October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation

    October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation

    DCMX Sound Effects Update~  Tribute to K-Rino with ‘Grand Deception’ National Detention Authorization Act (NDAA) Appeals Court Update Discussion Viruses, Hacking, Stuxnet & Flame – ZeroDay Exploits, Who is Building Them? Patriot Act Being Used to Silence Activism & Protest! Romney goon offers absurd recommendation for the Banking Industry Further Discussion of the Conspiracy Matrix…

  • Sell Out Hackers: The Zero-Day Exploit Market

    Sell Out Hackers: The Zero-Day Exploit Market

    Exploit sellers arm governments and businesses, but are they harming security for everyone else? Remember the final battle scene in Star Wars: A New Hope? Remember how Luke Skywalker slotted a bomb from his X-Wing down the Death Star’s exhaust port to blow the spherical space-station apart? Well that port is much like a zero-day…

  • Barrett Brown – Communiqué from Prison 9/20/12

    Barrett Brown – Communiqué from Prison 9/20/12

    It is hard for me to express how much I appreciate your letter, which is the first I have received here, along with the support I’ve reportedly gotten from others so far. Before I forget, let me request that you also send a tweet of support to Jenna, @ElviraXMontana on Twitter; as my girlfriend, she…

  • Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

    Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

      Anonymous has a way of releasing massive collections of information that raise many more questions than they answer. Case in point: On Monday night, the segment of the hacker group that calls itself Antisec announced that it had dumped 1,000,001 unique device identifier numbers or UDIDs for Apple devices–the fingerprints that Apple, apps and…

  • PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

    PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

    In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved. The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and…

  • Pwn The Drones: Investigative Research into Drone Technology, Vulnerabilities, Exploits, Future

    Pwn The Drones: Investigative Research into Drone Technology, Vulnerabilities, Exploits, Future

    EFF activists Trevor Timm and Parker Higgins explain how widespread drones are becoming, how they’ve already been hacked, and how the situation may get a lot worse before it gets better.    

  • Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape

    Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape

    Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related  to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole…

  • VPN vs. SSH Tunnel: Which Is More Secure?

    VPN vs. SSH Tunnel: Which Is More Secure?

    VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide…

  • #InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

    #InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

    UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently: I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated if his attacks appear to come…

  • How NSA access was built into Windows

    How NSA access was built into Windows

    Careless mistake reveals subversion of Windows by NSA? A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows…

  • Is Anonymous The Internet’s Most Powerful Mirage?

    Is Anonymous The Internet’s Most Powerful Mirage?

    You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency. Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed to have nabbed “lots of shiny…

  • Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP

    Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP

    In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean…