shopify traffic stats
Adam ‘Lorax’ Bennett – Activist, Humanitarian
Anonymous radio host know as Lorax was arrested (full article). Everybody who known Lorax know he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as an experienced life saver and a fundraising manager for Cancer Support. This kind of... Read more
Aaron Swartz – Programmer, Activist
Aaron Swartz was a computer programmer and Internet activist who is often referred to as the third founder of Reddit. “”I don’t think I have any particular technical skills. I just got a really large head start.”” -Aaron Swartz Early Years Aaron Swartz was born on November 8, 1986,... Read more
Mysterious Shadow Hackers: The Equation Group
An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos... Read more
Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer
AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.... Read more
Barrett Brown – Journalist, Activist
Barrett Brown is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes. He is credited with the creation of Project PM, a research outfit and information collective determined to expose agents of the corporate... Read more
YTCracker – Hacker, Rapper, Activist
Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.   Read more
Christopher Doyon – Hacker
Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada. Read more
Gary McKinnon – Hacker
Gary McKinnon (born 10 February 1966) is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the “biggest military computer hack of all time,” although McKinnon himself – who has a diagnosis of Asperger’s Syndrome – states that he was merely looking for evidence of free energy suppression and a... Read more
Recommendations for the Hacktivist Community
Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us define a “hacker” as someone... Read more
Hack Back: A DIY Guide for Those Without the Patience to Wait for Whistleblowers
  –– Introduction I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out... Read more
DARPA Hackers Show How Cars Can Be Remotely Controlled
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a security engineer... Read more
November 21, 2012 – DCMX Radio:  Anonymous on Gaza & Israel War Crimes, AT&T iPad Conviction, Blackwater CEO’s New Biz, Random Headlines, Uruguay President Charity
Anonymous statements on Gaza / Israel Conflict & Ceasefire Security researcher Andrew Aurenheimer found guilty of conspiracy and identity fraud in ‘hackless’ AT&T iPad breach Ex-navy SEAL & War Criminal Erik Prince sets trail for Chinese & International Investors into Africa RANDOM QUICK HEADLINES Uruguay President, Jose Mujica, Donates... Read more
Are Aliens Real? Hacker Gary McKinnon Says Evidence is in Military Computers, US Seeks Extradition
Are aliens real? One hacker who broke into US Military computers says yes, claiming that he found evidence of extraterrestrial life in the computer networks he broke into. Now, the United States is seeking extradition for breaching both military and NASA computer networks. However, the UK says that he... Read more
October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation
DCMX Sound Effects Update~  Tribute to K-Rino with ‘Grand Deception’ National Detention Authorization Act (NDAA) Appeals Court Update Discussion Viruses, Hacking, Stuxnet & Flame – ZeroDay Exploits, Who is Building Them? Patriot Act Being Used to Silence Activism & Protest! Romney goon offers absurd recommendation for the Banking Industry... Read more
Sell Out Hackers: The Zero-Day Exploit Market
Exploit sellers arm governments and businesses, but are they harming security for everyone else? Remember the final battle scene in Star Wars: A New Hope? Remember how Luke Skywalker slotted a bomb from his X-Wing down the Death Star’s exhaust port to blow the spherical space-station apart? Well that... Read more
Barrett Brown – Communiqué from Prison 9/20/12
It is hard for me to express how much I appreciate your letter, which is the first I have received here, along with the support I’ve reportedly gotten from others so far. Before I forget, let me request that you also send a tweet of support to Jenna, @ElviraXMontana... Read more
Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI
  Anonymous has a way of releasing massive collections of information that raise many more questions than they answer. Case in point: On Monday night, the segment of the hacker group that calls itself Antisec announced that it had dumped 1,000,001 unique device identifier numbers or UDIDs for Apple... Read more
PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones
In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved. The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor... Read more
Pwn The Drones: Investigative Research into Drone Technology, Vulnerabilities, Exploits, Future
EFF activists Trevor Timm and Parker Higgins explain how widespread drones are becoming, how they’ve already been hacked, and how the situation may get a lot worse before it gets better.     Read more
Out of Control: Flame, Stuxnet, and the Cyber-Security Landscape
Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related  to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York... Read more
VPN vs. SSH Tunnel: Which Is More Secure?
VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor... Read more
#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog
UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently: I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated... Read more
How NSA access was built into Windows
Careless mistake reveals subversion of Windows by NSA? A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in... Read more
Is Anonymous The Internet’s Most Powerful Mirage?
You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency. Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed... Read more
Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms,... Read more