Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $26,725
30%  
Woo hoo!! And the first 30% is in!! Thank you all very much!! God bless.

Keyword: hacker

Brevity: Headers | « Text »
  • Vanity - Trump Donation Site Hacked?

    07/08/2016 1:42:41 PM PDT · by Cementjungle · 22 replies
    07/08/2016 | self
    I was wondering if anyone else here recently donated to Trump's campaign.... directly through his site. I did on 6/30 using my debit card, which I never use (except for things like this... the only other time I've used it recently was for a donation to Free Republic, but that was a couple months ago). I saw an unauthorized charge on my statement this morning... for $50 on someone's cellphone Starbucks app. so, I called the bank and cancelled the card and they'll reverse the charge of course.... but since this donation was my only use of the card in...
  • Hackers use Google to find website vulnerabilities

    02/23/2008 12:30:32 PM PST · by george76 · 29 replies · 396+ views
    Agence France Presse ^ | Feb 22, 2008
    Infamous computer hacker group Cult of the Dead Cow (CDC) said Friday it is offering a software tool that lets people use Google to scan websites for security flaws. CDC says a "Goolag Scanner" program based on work done by a hacker using the name "Johnny I Hack Stuff" is available for free download at its website. The tool lets people with fundamental programming skills check websites or Internet domains for weaknesses that could be exploited by hackers, according to CDC. The group said it uncovered "some pretty scary holes" through random tests of the tool in North America, Europe,...
  • How to surf anonymously without a trace

    03/13/2007 6:29:37 AM PDT · by ShadowAce · 93 replies · 19,520+ views
    ComputerWorld ^ | 12 March 2007 | Preston Gralla
    The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. There are things you can do to keep your surfing habits anonymous...
  • 42-Page Leaked DNC Document Reveals Clinton Foundation Scandal ‘Vulnerabilities’ for Hillary Clinton

    06/21/2016 3:35:37 PM PDT · by bobsunshine · 28 replies
    Breitbart ^ | June 21, 2016 | Stephan Bannon
    A hacked 42-page Democrat National Committee memo released on Monday reveals the dizzying array of Clinton Foundation scandal facts the DNC considers “vulnerabilities” for presumptive Democratic Party presidential nominee Hillary Clinton. The secret document, titled “Clinton Foundation Vulnerabilities Master Doc FINAL,” is one of several newly released internal memos obtained by the hacker known as “Guccifer 2.0.” Totaling over 22,000 words in length, the DNC vulnerabilities dossier paints a portrait of a political party besieged by media coverage of foreign Clinton Foundation donations spawned by the investigative New York Times bestselling book, Clinton Cash. The document chronicles hundreds of news...
  • DNC Financial Records Stolen By "Guccifer 2.0" Hacker swiped personal

    06/18/2016 9:52:59 AM PDT · by COUNTrecount · 9 replies
    The Smoking Gun ^ | June 17, 2016 | Guccifer
    DNC Financial Records Stolen By "Guccifer 2.0" Hacker swiped personal info on thousands of party backers JUNE 17--Though the Democratic National Committee contends that no financial, donor, or personal information was stolen during the breach of its computer networks, that claim is belied by an assortment of internal party documents provided to TSG by “Guccifer 2.0,” the vandal who has claimed credit for the hacking. The hacker forwarded an assortment of Excel spreadsheets containing the names, e-mail addresses, occupations, and phone numbers of thousands of individuals, many of whom are listed as Democratic donors. According to metadata embedded in the...
  • Romanian hacker who says he breached Clinton server finalizing plea deal

    05/23/2016 12:39:45 PM PDT · by jazusamo · 66 replies
    Fox News ^ | May 23, 2016 | Catherine Herridge, Pamela K. Browne
    The Romanian hacker who claimed he easily breached Hillary Clinton’s personal email server is finalizing a plea deal with the FBI and U.S. attorney, Fox News has learned. Marcel Lehel Lazar, the 44-year-old hacker also known as “Guccifer,” first gave indications he wanted to cooperate with the U.S. government in mid-April, during an interview with Fox News. Lazar, in a subsequent discussion, said he was working on a plea deal – he then suspended media contact earlier this month. On Monday, a spokesman for the U.S. attorney in the Eastern District of Virginia confirmed that a change of plea hearing...
  • Experts Urge Password Changes After Massive Cyber Attack

    05/06/2016 5:10:50 PM PDT · by nickcarraway · 41 replies
    NBC San Diego ^ | May 5, 2016
    The hack affected providers such as Google, Yahoo, Hotmail and MicrosoftCybersecurity professionals are warning anyone with a personal email account to change their passwords after stolen user names and passwords were being offered up for sale on the Internet, NBC News reported. Some 272.3 million accounts were stolen - and involve some of the biggest email providers, including Google, Yahoo, Hotmail and Microsoft, according to Alex Holden of Hold Security. "We know he's a young man in central Russia who collected this information from multiple sources," Holden told NBC News. "We don't know the way he did it or the...
  • Romanian hacker who claims he breached Clinton server says he spoke with FBI at length

    05/06/2016 3:58:59 PM PDT · by jazusamo · 43 replies
    Fox News ^ | May 6, 2016 | Catherine Herridge, Pamela K. Browne
    EXCLUSIVE: The Romanian hacker who says he easily breached Hillary Clinton’s personal email server also claimed, in a series of interviews with Fox News, that he spoke with the FBI at length on the plane when extradited from Romania to Virginia last month. "They came after me, a guy from the FBI, from the State Department," 44-year-old Marcel Lehel Lazar, who goes by the moniker "Guccifer," told Fox News during a jailhouse phone interview. He said the conversation was "80 minutes ... recorded," and he took his own notes. A government source confirmed that the hacker had a lot to...
  • Russian hacker hands over 272 million unique email accounts

    05/06/2016 10:39:02 AM PDT · by Ernest_at_the_Beach · 10 replies
    fudzilla.com ^ | 05 May 2016 | by Jon Worrel
    Biggest credential cache amassed by a single individual to dateThis week, an anonymous young Russian hacker calling himself “the Collector” just handed over roughly 232 million unique email account credentials and passwords on a social media forum, with a total cache of 1.17 billion records. The hacker claims he only wanted 50 rubles – approximately 75 cents – for all of the information, but ended up simply exchanging them for “likes” on his social media page and some favorable comments about him in hacker forums, according to cyber security experts.The obtained credential information breaks down as follows – over 57...
  • Hillary Gets Guccifered

    05/06/2016 7:18:00 AM PDT · by conservatism_IS_compassion · 26 replies
    The Wall Street Journal ^ | May 6, 2016 | Kimberly Strassel
    The Chinese are bright - even brighter than Romanian taxi drivers. They employ hackers whose only job is to infiltrate the U.S. government. Those hackers have supercomputers at their service. They have lists upon lists of relatives and friends and aides of powerful people. When they break into accounts, they don’t publicize it.
  • For Guccifer, Hacking Was Easy. Prison Is Hard. (2014 Guccifer Article)

    05/05/2016 12:46:10 PM PDT · by PJ-Comix · 10 replies
    New York Times ^ | November 10, 2014 | ANDREW HIGGINS
    ARAD, Romania — He reveled in tormenting members of the Bush family, Colin L. Powell and a host of other prominent Americans, and also in outfoxing the F.B.I. and the Secret Service, foiling their efforts to discover even his nationality, never mind his identity. Early this year, however, the elusive online outlaw known as Guccifer lost his cocky composure and began to panic. He smashed his hard drive and cellphone with an ax. That spasm of precautionary destruction, at his home in Romania’s Transylvania region, did not help him much — especially as he left pieces of what would later...
  • Will (Romanian hacker) Guccifer Upend Hillary?

    04/09/2016 2:00:16 AM PDT · by Zakeet · 34 replies
    PJ Media ^ | April 8, 2016 | Roger L Simon
    After several years of incarceration in his native Romania, Marcel Lazar Lehel, aka Guccifer, has finally arrived this week in Alexandria, Virginia, to face nine charges of computer hacking. Guccifer, it will be recalled, is the one who revealed the presence of Hillary Clinton's private server through his hacking of Sidney Blumenthal's email account. Catherine Herridge and Pamela K. Browne of Fox point out the interesting timing of his extradition: Romanian media have reported the [FBI] request came on or about Dec. 29, 2015. That would have been shortly after the intelligence community's identification of emails beyond "top secret" on...
  • Source: No 'coincidence' Romanian hacker Guccifer extradited amid Clinton probe

    04/08/2016 11:22:50 AM PDT · by Nachum · 39 replies
    Fox News ^ | 4/8/16 | Catherine Herridge, Pamela K. Browne
    The extradition of Romanian hacker “Guccifer” to the U.S. at a critical point in the FBI’s criminal investigation of Hillary Clinton’s email use is “not a coincidence,” according to an intelligence source close to the case. One of the notches on Guccifer’s cyber-crime belt was allegedly accessing the email account of Clinton confidant Sidney Blumenthal, one of Clinton’s most prolific advice-givers when she was secretary of state. It was through that hack that Clinton's use of a personal account -- clintonemail.com -- first came to light. Former law enforcement and cyber security experts said the hacker, whose real name is...
  • Clinton (Romanian email) Hacker Extradited to U.S.

    03/07/2016 3:17:21 PM PST · by Libloather · 23 replies
    Weekly Standard ^ | 3/07/16 | Jim Swift
    Romanian hacker Marcel Lazar Lehel - better known as Guccifer - is being extradited to the United States, say news reports. The hacker has scored many notable victims in recent years, including Hillary Clinton shadow adviser Sid Blumenthal. Guccifer once bragged to PANDO that "I used to read [Clinton's] memos... and then do the gardening."
  • Congress to federal agencies: You have two weeks to tally your backdoored Juniper kit

    01/27/2016 7:23:22 PM PST · by Utilizer
    Computerworld ^ | Jan 26, 2016 8:51 AM PT | Lucian Constantin
    Congress plans to question about two dozen federal agencies on whether they were using backdoored Juniper network security appliances. In December, Juniper Networks said it had discovered unauthorized code added to ScreenOS, the operating system that runs on its NetScreen network firewalls. The rogue code, which remained undetected for two years or more, could have allowed remote attackers to gain administrative access to vulnerable devices or to decrypt VPN connections. The U.S. House Committee on Oversight and Government Reform wants to determine the impact that this issue had on government organizations and how those organizations responded to the incident. The...
  • Millions more government fingerprints deemed stolen

    09/23/2015 10:04:55 AM PDT · by Fitzy_888 · 7 replies
    AP via CNBC ^ | 9/23/15 | By KEN DILANIAN, AP Intelligence Writer
    <p>WASHINGTON (AP) — The number of people applying for or receiving security clearances whose fingerprint images were stolen in one of the worst government data breaches is now believed to be 5.6 million, not 1.1 million as first thought, the Office of Personnel Management announced Wednesday.</p>
  • Spy found dead in a bag 'had infuriated his MI6 bosses by illegally hacking into secret US data on B

    08/30/2015 9:36:59 AM PDT · by E. Pluribus Unum · 38 replies
    Daily Mail ^ | 08/30/2015 | Jenny Stanton
    Gareth Williams's body was found in a bag at his London flat five years ago Spy illegally hacked into secret data on former U.S. president Bill Clinton Personal voicemail messages left by the spy were deleted after he died The British spy whose body was found padlocked inside a bag in his flat had illegally hacked into secret data on former U.S. president Bill Clinton, it has been revealed. Gareth Williams, 31, was discovered in a holdall in the bath at his London home five years ago this month, but the mystery surrounding his death has never been solved. Today,...
  • The US Arrested an Alleged Russian Hacker — And Russia Is Pissed

    07/08/2014 10:08:18 PM PDT · by WhiskeyX · 4 replies
    Vice News ^ | July 8, 2014 | 3:39 pm | Jordan Larson
    In the latest disagreement between Russia and the US, a 30-year-old Russian national has been arrested for allegedly hacking US retailers, gaining access to credit card information, and selling it. Roman Valerevich Seleznev was arrested while vacationing with his family in the Maldives; he was subsequently transported to Guam. In a statement on its website, the Russian Foreign Ministry denounced the arrest, referring to it as a “kidnapping” and “the latest unfriendly move from Washington."
  • ISIS hacks email accounts of top UK ministers

    09/13/2015 10:10:41 AM PDT · by Jyotishi · 4 replies
    Daily News & Analysis ^ | Sunday, September 13, 2015 | PTI
    At the beginning of this year, Twitter and YouTube accounts of the US Central Command (Centcom) were hacked by a group calling itself the "CyberCaliphate". Caption - Islamic State jihadists hacked into email accounts of top UK ministers London - British intelligence has uncovered a sophisticated espionage operation of the Islamic State in which jihadists targeted email accounts of top ministers, including the Home Secretary, according to a media report. An investigation by Government Communications Headquarters has discovered that extremists linked to the Islamic State of Iraq and Syria have been targeting information held by some of Prime Minister David...
  • Exposed! ... Hacker Threatens To Sell Hillary Clinton’s ENTIRE UNRELEASED Private Emails For $500K

    09/03/2015 5:30:23 AM PDT · by Zakeet · 107 replies
    Radar Online ^ | September 3, 2015
    Complete Headline: Exposed! Libya Security Briefs, Algeria Hostage Info & More — Hacker Threatens To Sell Hillary Clinton’s ENTIRE UNRELEASED Private Emails For $500K “Hillary or someone from her camp erased the outbox containing her emails, but forgot to erase the emails that were in her sent box,” an insider reveals to Radar of the Presidential contender’s latest nightmare. [Snip] Warns the insider, “If these emails get out to the public domain, not only is Hillary finished as a potential Presidential nominee, she could put our country’s national security at risk.”
  • Clinton Told Aide to Send Classified Info to Personal Email Address

    09/01/2015 7:08:41 PM PDT · by markomalley · 44 replies
    Washington Free Beacon ^ | 9/1/15 | Lachlan Markay
    On the same day that the “hacktivist” group WikiLeaks posted tens of thousands of classified State Department communications online, then-Secretary of State Hillary Clinton told a top deputy to send now-classified information to her personal email address, newly released emails reveal.“Here’s my personal email,” Clinton told former Sen. George Mitchell, then Clinton’s special envoy for Middle East peace. “Pls use this for reply.”Mitchell responded with details of discussions with Italian foreign minister Franco Frattini. Most of the contents of the email, released by the State Department on Monday night, are redacted pursuant to a Freedom of Information Act exemption designed...
  • Almost None of the Women in the Ashley Madison Database Ever Used the Site

    08/27/2015 8:51:12 AM PDT · by Izzy Dunne · 31 replies
    Gizmodo ^ | 8/26/15 | Annalee Newitz
    What I discovered was that the world of Ashley Madison was a far more dystopian place than anyone had realized. This isn’t a debauched wonderland of men cheating on their wives. It isn’t even a sadscape of 31 million men competing to attract those 5.5 million women in the database. Instead, it’s like a science fictional future where every woman on Earth is dead, and some Dilbert-like engineer has replaced them with badly-designed robots.
  • Cover Your Cams: Webcam of This Couple Got Hacked While Watching Netflix

    08/14/2015 11:03:34 AM PDT · by Cats Pajamas · 32 replies
    Hackread ^ | August 11, 2015 | Wagas
    The hackers are selling Remote Access Trojan (RAT) to the interested wannabe hackers, and believe it or not, most of the purchasers of these malware programs are youngsters and novice hackers. The malware and Trojans being provided by the hackers will allow anyone to take control of the targeted electronic device, eventually attacking the victim. The report calls them “ratters.”
  • Duqu 2.0 malware buried into Windows PCs using stolen Foxconn certs (Signed by Chinese factory)

    06/15/2015 8:24:50 PM PDT · by dayglored · 38 replies
    The Register ^ | June 15, 2015 | John Leyden
    The super-sophisticated malware that infiltrated Kaspersky Labs is more crafty than first imagined. We're told that the Duqu 2.0 software nasty was signed using legit digital certificates issued to Foxconn – a world-leading Chinese electronics manufacturer, whose customers include Microsoft, Dell, Google, BlackBerry, Amazon, Apple, and Sony. The code-signing was uncovered by researchers at Kaspersky Lab, who are studying their Duqu 2.0 infection. Windows trusts Foxconn-signed code because the Chinese goliath's certificate was issued by VeriSign, which is a trusted certificate root. Thus, the operating system will happily load and run the Foxconn-signed Duqu 2.0's 64-bit kernel-level driver without setting...
  • Hacker told F.B.I. he made plane fly sideways after cracking entertainment system

    05/16/2015 5:05:33 PM PDT · by Jim Robinson · 83 replies
    APTN National News ^ | May 15, 2015 | by Jorge Barrera
    A well-known U.S. hacker told F.B.I. agents he took momentary control of an airplane’s engines mid-flight by hacking into its inflight entertainment system, according to a document filed in U.S. federal court and obtained by APTN National News. Roberts, who has been interviewed at least three times by the F.B.I. this year, is under investigation for allegedly hacking into the electronic entertainment systems of airplanes, according to an application for a search warrant to probe seized electronic equipment. The document shows F.B.I. agents investigating Roberts believe he has the ability to do what he claims: take over flight control systems...
  • Jailed: Cheating student who hacked into university computer system to give himself a better degree

    04/25/2015 9:20:04 AM PDT · by pabianice · 18 replies
    Daily Mail ^ | 4/25/15 | Kent-Smith
    Imran Uddin, 25, used a keyboard spying device to obtain staff passwords Final-year student hacked into exam system and upped his own marks He increased one of his bio-science grades from 57 per cent to 73 per cent Uddin admitted breaking Computer Misuse Act and was jailed for 4 months Imran Uddin used a keyboard spying device to hack into university computers and up his exam marks +5 Imran Uddin used a keyboard spying device to hack into university computers and up his exam marks A student who tried to cheat his way to a better degree by hacking into...
  • United Airlines Kicks Computer Expert Off Flight For Tweets

    04/19/2015 8:59:46 PM PDT · by QT3.14 · 46 replies
    International Business Times ^ | April 19, 2015 | Eric Markowitz &#61954;
    Chris Roberts, a prominent computer security expert, was aboard a United Airlines flight last week when he tweeted about a potential security flaw he found on the plane’s on-board Wi-Fi. Big mistake. Airline personnel saw the tweet and alerted authorities at Syracuse Hancock International Airport where the flight was scheduled to land. Roberts exited the plane and was quickly detained by the FBI. Roberts, the founder and chief technical officer of the Denver security firm One World Labs, said the agents questioned him, confiscated several of his electronic devices, and then let him go. “Lesson from this evening, don't mention...
  • What's With The Emails To Hillary From Secret Spook Sid Blumenthal?

    04/10/2015 8:00:04 AM PDT · by afraidfortherepublic · 8 replies
    Jewish World Review ^ | 4-10-15 | Dick Morris
    Revelations from emails purloined by a Romanian hacker show that Hillary Clinton was being secretly advised about Libya -- before and after the Benghazi terrorist attack -- by an off-the-shelf private spook group associated with controversial former Clinton confidante Sydney Blumenthal that claimed to be helping the Libyan opposition and considered placing ground operatives near the border. What's this all about? It's not completely clear, but apparently the goal of the rogue group, which included a former high level CIA covert operative and a former U.S. General, was, at the very least, to gather and provide sensitive reports to the...
  • Jailed hacker Guccifer boasts, “I used to read [Clinton’s] memos… and then do the gardening”

    03/21/2015 10:31:26 PM PDT · by doug from upland · 47 replies
    pando dot com ^ | 3-20-15 | MATEI ROSCA
    Back in the Arad penitentiary, I ask Lehel about his heyday. Was it worth it? “I had memos Hillary Clinton got as a State Secretary, with CIA briefings. These were being read by her, two other people from the US Government, and Guccifer. I used to read her memos for six-seven hours and then I’d get up and do the gardening in the yard,” he says.
  • Hacker Reveals Contents from Hillary’s Private E-Mails and Shows Who She Was Talking To

    03/04/2015 8:47:37 AM PST · by E. Pluribus Unum · 58 replies
    Independet Journal Review ^ | 03/04/2015 | Larry O'Connor
    It appears Hillary Clinton was conducting serious and sensitive international affairs on her private email account. She also kept up confidential correspondence with a political operative who hasn’t worked for the government in over a decade.The revelation that Secretary of State Clinton used a private e-mail account rather than an official State Department e-mail struck many as troubling and potentially criminal.Experts in government transparency have debate the legality, and also the consequences of the emails. Patrice McDermott, head of Open The Government coalition, said: “What she did was not technically illegal. It was highly inappropriate and it was inappropriate for the...
  • Thunderstrike: The scary vulnerability in your Mac's Thunderbolt port

    01/08/2015 7:21:49 PM PST · by Swordmaker · 45 replies
    Mashable ^ | JAN 02, 2015 | BY CHRISTINA WARREN
    The MagSafe2 port, from left, two Thunderbolt ports, a USB 3 port and headphone port (top), SDXC Cardslot, HDMI port, and USB 3 port (bottom), on Apple's MacBook Pro. Similar mage from Apple Inc. substituted for original Getty Image on article site. According to a recent security presentation, attackers could infect Macintosh computers with a special kind of malware using the computer's Thunderbolt port. The attack, dubbed Thunderstrike, was showcased by security researcher Trammell Hudson at the Chaos Communications Congress in Germany. Hudson is well known in the security community, particularly for his work reverse-engineering various devices and systems....
  • Hackers Just Released A Tool That Could Threaten Everyone's iCloud Account

    01/02/2015 6:34:45 AM PST · by SeekAndFind · 65 replies
    Business Insider ^ | 01/02/2015 | James Cook
    A hacker has released a tool that he says can break into any iCloud account. The tool, iDict, uses an exploit in Apple's security to bypass restrictions that stop most hackers from gaining access to accounts. On iDict's GitHub page, user "Pr0x13" says the exploit used to create the hacking tool is "painfully obvious" and that it "was only a matter of time" before hackers used it to break into iCloud accounts. The tool is described as a "100% working iCloud Apple ID dictionary attack that bypasses account lockout restrictions and secondary authentication on any account."
  • Inside the ‘Surprisingly Great’ North Korean Hacker Hotel (luxury pad - in China)

    12/21/2014 9:34:39 AM PST · by Libloather · 11 replies
    The Daily Beast ^ | 12/20/14 | Michael Daly
    North Korea is so isolated that rather than bring the Internet to its hackers, it brings them to it—in a swank hotel in China. The luxury hotel that has been called a command post for North Korean hackers would make for a unique holiday getaway and give you lots to talk about back home. “Surprisingly Great Hotel - Clean, Tasteful.... and North Korean!” says a trip advisor review for the Chilbosan Hotel in Shenyang, China. For just $53, you get “a deluxe twin room,” including a North Korean breakfast considerably more substantial than those enjoyed by the vast majority of...
  • Dangerous 'Misfortune Cookie' flaw discovered in 12 million home routers

    12/19/2014 9:29:02 PM PST · by Swordmaker · 23 replies
    PCWorld ^ | December 19, 2014 | By John E. Dunn
    Researchers at Check Point have discovered a serious security vulnerability affecting at least 12 million leading-brand home and SME routers that appears to have gone unnoticed for over a decade. Dubbed the ’Misfortune Cookie’ flaw, the firm plans to give a detailed account of the issue at a forthcoming security conference but in the meantime it’s important to stress that no real-world attacks using it have yet been detected. That said, an attacker exploiting the flaw would be able to monitor all data travelling through a gateway such as files, emails and logins and have the power to infect connected...
  • Iranian hackers compromised airlines, airports, critical infrastructure companies

    12/02/2014 7:33:30 PM PST · by grandpa jones · 11 replies
    IT World ^ | 12/2/14 | Lucian Constantin
    For the past two years, a team of Iranian hackers has compromised computers and networks belonging to over 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, hospitals, airports, telecommunications firms, government agencies, and energy and gas companies. The attacks have collectively been dubbed Operation Cleaver after a string found in various malware tools used by the hacker group, which is believed to operate primarily out of Tehran. "We discovered over 50 victims in our investigation, distributed around the globe," said researchers from IT security firm Cylance in an extensive report released Tuesday. "Ten of these victims...
  • Maybe Better If You Don’t Read This Story on Public WiFi

    10/18/2014 7:52:38 AM PDT · by GonzoII · 22 replies
    Medium.com ^ | 15 Oct 2014 | Maurits Martijn
    We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled. In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. It is a sunny day and almost all the tables are occupied. Some people talk, others are working on their laptops or playing with their smartphones. Wouter removes his laptop from his backpack,...
  • Hacker Successfully Breached Healthcare.gov Insurance Website

    09/04/2014 2:20:13 PM PDT · by sheikdetailfeather · 18 replies
    The Blaze ^ | 9/4/2014 | Jason Howerton
    A hacker successfully breached Healthcare.gov in July and uploaded “malicious software,” MarketWatch reports, citing federal officials. However, investigators said consumers’ personal information doesn’t appear to have been compromised or stolen. In a written statement, the Department of Health and Human Services noted that its review shows that the hacked server “did not contain consumer personal information; data was not transmitted outside the agency, and the website was not specifically targeted.” The statement also claimed that measures have been taken to “further strengthen security.”
  • Banks: Credit Card Breach at Home Depot

    09/02/2014 2:19:02 PM PDT · by BlueMondaySkipper · 70 replies
    Krebs On Security ^ | September 2, 2014 | Brian Krebs
    Multiple banks say they are seeing evidence that Home Depot stores may be the source of a massive new batch of stolen credit and debit cards that went on sale this morning in the cybercrime underground. Home Depot says that it is working with banks and law enforcement agencies to investigate reports of suspicious activity.
  • Hackers declare "nuclear leak" on Israeli Twitter account

    07/04/2014 8:29:04 PM PDT · by Citizen Zed
    IBN Live ^ | 05-Jul-2014 08:44 AM
    Jerusalem: Hackers posted a bogus announcement of a rocket strike against Israel's Dimona reactor and a possible nuclear leak on a Twitter account used by the Israeli military, which said on Friday it was combating such cyber attacks. The English-language account, @IDF Spokesperson, has 252,000 followers and usually scrolls out rapid updates on Israel's various fighting fronts. It was inactive on Friday, however, as a military spokeswoman said "several incorrect tweets" were being investigated by Israeli authorities. She did not elaborate, but the Walla news site published a snapshot of a tweet that had appeared on the account on Thursday...
  • Estrada Pleads Guilty in Gov. Martinez's Hacked Email Case

    06/16/2014 5:56:26 PM PDT · by nickcarraway · 3 replies
    KOB4 ^ | 6/16 | Kristen Garcia
    Jamie Estrada, 41, of Los Lunas, N.M., pleaded guilty Monday to the unlawful interception of electronic communications and false statement charges arising out of the unlawful interception of wire communications intended for others, including New Mexico Governor Susana Martinez and members of her staff. Estrada briefly served as campaign manager in 2009, as Martinez was beginning her bid for governor. The Republican won election in 2010 and took office in January 2011. “Each and every one of us has a right and an expectation of privacy in our electronic communications, including our emails, and those who violate the law by...
  • Family claims hacker taking control of cable box, sending threats

    03/27/2014 11:11:36 PM PDT · by Ray76 · 44 replies
    FOX59 Indianapolis ^ | Mar 27, 2014 | Yvonne Man
    A family claims they are being terrorized by their cable box. For more than a week, personal and harassing messages are showing up on their TVs. Meeks said it started more than a week ago — “he” or someone has taken control of her AT&T cable box and typing messages on two of her TVs. The family showed us a few. One wrote: ‘ISEEYOUHAHA’. Others even threatened to hurt Alana’s 9-year-old granddaughter, Aniya. “He wants to do more than hurt her,” said Meeks. “He wants to have sex with her. Pervert.” Some were quick to judge. However, an officer who...
  • Pvt. Manning seeks formal name change to Chelsea

    03/19/2014 9:07:57 PM PDT · by slumber1 · 47 replies
    The Dallas Morning News ^ | 3-19-14 | FROM WIRE REPORTS
    The Army private who was tried and convicted as Bradley Edward Manning for leaking U.S. secrets to WikiLeaks is petitioning a Kansas court for a name change, to Chelsea Elizabeth Manning.
  • Russia takes cyber-swipe at Illini (anti-Russian Hack Attack Came from U of Illinois)

    03/17/2014 3:57:18 PM PDT · by tcrlaf · 16 replies
    News-Gazette ^ | 3-17-14 | Christine Des Garennes
    CHAMPAIGN — University of Illinois officials are looking into claims made by some Russian media outlets that a Crimea-related cyberattack originated from here. The Voice of Russia, a Russian government-run media outlet, claimed on Sunday that the hacking of websites related to the referendum held in Crimea on Sunday came from the U.S. (Snip) The Voice of Russia described Sunday’s hackings as the “denial-of-service” type of attacks. “Our IT safety experts managed to find out where those attacks came from. It is University of Illinois at Urbana Champaign. The most powerful scanning of servers before the attack was carried out...
  • World Cup Security Concerns Grow as Santos Fan is Beaten to Death...

    02/27/2014 12:08:48 AM PST · by Cindy · 11 replies
    DAILY MAIL [UK] ^ | February 25, 2014 | by Mike Dawes
    SNIPPET: "Security concerns ahead of this summer's Brazilian World Cup have increased after a football fan was beaten to death in host city Sao Paulo." SNIPPET: "There are serious concerns about the safety of travelling supporters at this summer's World Cup after more than 30 people were killed in 2013 as a result of football-related violence. One of Brazil’s biggest criminal gangs last year promised a ‘Tournament of Terror’. The threat was issued by Sau Paulo's 'First Capital of the Command', who in 2012 was a group behind the murder of more than a hundred of the city’s police officers."
  • World’s worst human finally arrested by the FBI

    01/25/2014 9:14:31 AM PST · by rickmichaels · 29 replies
    National Post ^ | Jan. 24, 2014 | AP
    LOS ANGELES — A notorious “revenge porn” website operator and another California man have been charged with stealing nude photos from hundreds of hacked email accounts and posting the images online. Hunter Moore, 27, who has been dubbed by some media outlets as “the most hated man on the Internet,” was arrested Thursday at his home. FBI agents also arrested Charles Evens, 25, of the Studio City area of Los Angeles. Evens pleaded not guilty in a Los Angeles court while Moore appeared in court in Sacramento but didn’t enter a plea, U.S. attorney’s spokesman Thom Mrozek said. Both remained...
  • Snapchat stays quiet after 4.6M accounts hacked

    01/02/2014 2:01:50 PM PST · by Lorianne · 9 replies
    CBC News ^ | 02 January 2014
    Snapchat, the disappearing-message service popular with young people, has been quiet following a security breach that allowed hackers to collect the usernames and phone numbers of millions of its users. Company spokeswoman Mary Ritti said Thursday morning that the company is assessing the situation, but did not have further comment. As the U.S. and Canada rang in the New Year, hackers reportedly published 4.6 million Snapchat usernames and phone numbers on a website called snapchatdb.info, which has since been suspended. The breach came less than a week after security experts alerted Snapchat of a vulnerability in its system and warned...
  • Security Experts Warn Healthcare.gov Is Vulnerable to Hacking

    12/03/2013 9:18:34 AM PST · by topher · 25 replies
    ABC News ^ | Nov 19, 2013 6:01pm | John Parkinson
    Cyber security experts told Congress today that the Obama administration should take Healthcare.gov offline until privacy vulnerabilities are addressed and detection capabilities are improved. David Kennedy, a so-called “white hat hacker” who tests security flaws by hacking online systems to help identify weaknesses, warned that there are critical flaws and exposures “currently on the website that hackers could use to extract sensitive information.” “The purpose of security isn’t to say, ‘Hey, we’re 100 percent impenetrable all the time,’ but can we detect the hackers in the very early stages of the life cycle of the attack, monitor that, and prevent...
  • Twelve-year-old hacks government sites for Anonymous

    10/28/2013 9:46:00 AM PDT · by rightwingintelligentsia · 16 replies
    Newsy via WFTV.com ^ | October 27, 2013 | Jamal Andress
    Remember that really terrible thing you did as a child? Remember telling yourself it could be worse? Well, now you can really mean it. A 12-year-old boy from Quebec, Canada, pleaded guilty to hacking government and police websites for the hacktivist group Anonymous. (Via Gizmodo) The fifth grader, who was 11 at the time, was working with Anonymous during the 2012 student uprising in Quebec, where students protested a proposed tuition hike for several months. (Via Vimeo / nate) The Montreal Police, the Quebec Institute of Public Health and the Chilean government websites were all hacked by the boy. According...
  • Mozilla's Lightbeam tool will expose who is looking over your shoulder on the web

    10/25/2013 6:41:56 AM PDT · by Red Badger · 39 replies
    Independent UK | 10-25-2013 | Adam Sherwin
    http://www.independent.co.uk/life-style/gadgets-and-tech/news/mozillas-lightbeam-tool-will-expose-who-is-looking-over-your-shoulder-on-the-web-8902269.html
  • Exclusive: Sarah Palin Under Cyber-Attack from Wikileaks Supporters in 'Operation Payback'

    12/08/2010 2:57:31 PM PST · by Free ThinkerNY · 145 replies · 9+ views
    ABC News ^ | Dec. 8, 2010 | Jake Tapper
    The website and personal credit card information of former Gov. Sarah Palin were cyber-attacked today by Wikileaks supporters, the 2008 GOP vice presidential candidate tells ABC News in an email. Hackers in London apparently affiliated with “Operation Payback” – a group of supporters of Julian Assange and Wikileaks – have tried to shut down SarahPac and have disrupted Sarah and Todd Palin’s personal credit card accounts. “No wonder others are keeping silent about Assange's antics,” Palin emailed. “This is what happens when you exercise the First Amendment and speak against his sick, un-American espionage efforts.” Palin has criticized Wikileaks founder...