Tag: Hacking
-
Mysterious Shadow Hackers: The Equation Group
An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos of herself and her colleagues snapped…
-
YTCracker – Hacker, Rapper, Activist
Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17. Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the…
-
Christopher Doyon – Hacker
Christopher Doyon Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the…
-
Gary McKinnon – Hacker
Gary McKinnon (born 10 February 1966) is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the “biggest military computer hack of all time,”[2] although McKinnon himself – who has a diagnosis of Asperger’s Syndrome – states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other…
-
Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers
–[ 1 ]– Introduction I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have…
-
DARPA Hackers Show How Cars Can Be Remotely Controlled
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer for Twitter. These two security researchers…
-
November 21, 2012 – DCMX Radio: Anonymous on Gaza & Israel War Crimes, AT&T iPad Conviction, Blackwater CEO’s New Biz, Random Headlines, Uruguay President Charity
Anonymous statements on Gaza / Israel Conflict & Ceasefire Security researcher Andrew Aurenheimer found guilty of conspiracy and identity fraud in ‘hackless’ AT&T iPad breach Ex-navy SEAL & War Criminal Erik Prince sets trail for Chinese & International Investors into Africa RANDOM QUICK HEADLINES Uruguay President, Jose Mujica, Donates Most Of His Pay To Charity…
-
Are Aliens Real? Hacker Gary McKinnon Says Evidence is in Military Computers, US Seeks Extradition
Are aliens real? One hacker who broke into US Military computers says yes, claiming that he found evidence of extraterrestrial life in the computer networks he broke into. Now, the United States is seeking extradition for breaching both military and NASA computer networks. However, the UK says that he isn’t fit to stand trial and…
-
Sell Out Hackers: The Zero-Day Exploit Market
Exploit sellers arm governments and businesses, but are they harming security for everyone else? Remember the final battle scene in Star Wars: A New Hope? Remember how Luke Skywalker slotted a bomb from his X-Wing down the Death Star’s exhaust port to blow the spherical space-station apart? Well that port is much like a zero-day…
-
Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI
Anonymous has a way of releasing massive collections of information that raise many more questions than they answer. Case in point: On Monday night, the segment of the hacker group that calls itself Antisec announced that it had dumped 1,000,001 unique device identifier numbers or UDIDs for Apple devices–the fingerprints that Apple, apps and…
-
Pwn The Drones: Investigative Research into Drone Technology, Vulnerabilities, Exploits, Future
EFF activists Trevor Timm and Parker Higgins explain how widespread drones are becoming, how they’ve already been hacked, and how the situation may get a lot worse before it gets better.
-
Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape
Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole…
-
VPN vs. SSH Tunnel: Which Is More Secure?
VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide…
-
#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog
UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently: I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated if his attacks appear to come…
-
Is Anonymous The Internet’s Most Powerful Mirage?
You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency. Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed to have nabbed “lots of shiny…