17 posts tagged with Hacker and hacking.
Displaying 1 through 17 of 17. Subscribe:

"What would work even against an infosec guy? Linkedin invites."

How I Hacked Your Router
posted by the man of twists and turns on Apr 6, 2014 - 63 comments

"irresistible high-low raw material for an online news cycle"

From a small town in Romania, Guccifer skewered and glorified the power elite.
If Snowden perfectly fit the profile of geek crusader, Lehel, a stone-faced, disheveled man in a tight leather jacket, seemed an odd candidate for one of the world’s most notorious hackers. But Guccifer is to hacking what the Beatles are to rock and roll. He had predecessors, 4Chan cowboys like Anonymous and Sabu of LulzSec, but he’s changed the nature of hacking fame. Guccifer rose by exploiting the connections people make online to infiltrate the private lives of some of the most powerful people on Earth. He served up the results to the media, irresistible high-low raw material for an online news cycle driven by leaks and voyeurism and racked by anxiety over privacy.
What Is A Guccifer? [more inside]
posted by the man of twists and turns on Jan 27, 2014 - 12 comments

Innovation or Exploitation

The Limits of Computer Trespass Law (Lengthy video with audio available) "Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law!" Legal and internet thinkers (including Ed Felten, Jennifer Granick, Dan Auerbach, & others) talk about vagueness in the Computer Fraud and Abuse Act, chilling effects, and the prosecution of Aaron Swartz in a panel discussion at Stanford's Center for Internet and Society. [more inside]
posted by gauche on Aug 29, 2013 - 16 comments

Green Dam Youth Escort

"During his civil lawsuit against the People's Republic of China, Brian Milburn says he never once saw one of the country's lawyers. He read no court documents from China's attorneys because they filed none. The voluminous case record at the U.S. District courthouse in Santa Ana contains a single communication from China: a curt letter to the U.S. State Department, urging that the suit be dismissed. That doesn't mean Milburn's adversary had no contact with him." [China Mafia-Style Hack Attack Drives California Firm to Brink]
posted by vidur on Nov 28, 2012 - 12 comments

*sigh* Sometimes I hate computers...

"Millions" Of Home Routers Vulnerable to a Web Hack At the upcoming Black Hat Conference, to be held on July 29th in Las Vegas this year, a security researcher and ethical hacker named Craig Heffner will reveal a software tool to exploit a large-scale vulnerability in most home routers that will give users outside of the network access to the device. [more inside]
posted by codacorolla on Jul 16, 2010 - 40 comments

The sky above the port was the color of a NAND IC... turned out with dead channels.

Ghost shift ghost chips. A tale about a Chumby hardware developer with a keen investigative eye noticing some oddities about microSD FLASH cards from supposedly reputable suppliers.
posted by loquacious on Feb 16, 2010 - 65 comments

The Middler

Your Gmail account isn't secure. Announced at Defcon 16, Jay Beale's tool, The Middler (man-in-the-middle) to steal session ID from not only Gmail users, but LinkedIn, LiveJournal, Facebook, and presumably any site that uses a session-based cookie. Enable https permanently. (previously)
posted by sluglicker on Aug 28, 2008 - 53 comments

Pacemaker vulnerable to remote hacking

Serious as a heart attack: A collaboration of various medical researchers in the academic field has led to proof that pacemakers can be remotely hacked with simple and accessible equipment. This is a proof of concept, but the real question is: How many other pacemakers and medical devices are similarly vulnerable? (Writers may note a new twist available for the assassination of characters in their novels and screenplays.)
posted by spock on Aug 13, 2008 - 41 comments

Band of Developers

A hacker breaks into the forums of the guild Band of Brothers on the MMORPG Eve, where he discovers an Eve devolper, called t20, is not only a high-ranking member of the alliance, but has been feeding BoB expensive and rare in-game items. CCP, the company who runs EVE, denies any wrong doing, before it is revealed that CCP knew about t20's abuses for over six months. Players are not happy.
posted by Snyder on Feb 12, 2007 - 49 comments

What Not To Do and How Not To Do It

Idiot Tries to Hire Hacker to Change his GPA
Why study when you can just hire a hacker to adjust your GPA to something more to your liking? Or not.
And now an amazing (and scary) amount of his personal information is pwned!
posted by fenriq on Dec 21, 2006 - 70 comments

Harvard rejects

"Hacker" discovers backdoor to Harvard Business School admissions decisions.
Harvard rejects all applicants who used the "hack."
posted by trharlan on Mar 8, 2005 - 68 comments

Hacker or Lynx user?

Boing Boing says he's a Lynx user, but British Telecom declared him a hacker and that's what the BBC is carrying. There's no way to tell who's right yet, but I'd say the Bloggers are betting on Lynx user. Anyone got an update?
posted by krisjohn on Jan 27, 2005 - 30 comments

Christopher Andrew Phillips, hacker?

Christopher Andrew Phillips, the University of Texas at Austin student accused of "hacking" the school's computer system, has turned himself in. But reading about his method makes me wonder if this really is hacking and/or illegal...
posted by Big_B on Mar 14, 2003 - 13 comments

Not only can Kevin Mitnick not touch a computer, cell phone, or the Internet for three years, but a judge is trying to bar him from the lecture circut because he's talking about hacking and technology. I wonder, if they get him to stop talking about technology, are they going to bust him for thinking about it too?
posted by mathowie on Apr 28, 2000 - 4 comments

They bagged the kid who was responsible

They bagged the kid who was responsible for all those Denial-of-Service attacks a couple of months ago. He's Canadian.

Here's an interesting legal question: could the US extradite him? The crimes were committed in the US, but he was in Canada at the time he did it, since he worked through the Internet. Whose laws apply?

(By the way, I've seen no indication that the US is considering extradition; I was just curious whether they could extradite him.)
posted by Steven Den Beste on Apr 19, 2000 - 18 comments

Last night Kevin Mitnick was on 60 minutes (the gist of the interview is quoted here), and I have to say he came off as an utterly harmless geek. He was an information junkie that enjoyed the challenge of cracking firewalls. He never profited from his activities and the affected companies made up their monetary losses. It's a shame he was forced to waste away in prison instead of offer his security expertise to the affected companies.
posted by mathowie on Jan 24, 2000 - 1 comment

Kevin Mittnick is finally being released from prison today,

Kevin Mittnick is finally being released from prison today, but I wouldn't call what he's getting as being "free". Prohibiting Kevin from touching a computer for 3 years? This isn't like giving a toddler to a ex-con child molester, it's a computer. A person can do a lot of things besides hack into company servers. How does anyone expect Kevin to make the $125 restitution he owes each month, if he can't use a computer or get a job that requires a computer? Now that I think about it, what percentage of decent jobs are completely free of computers?
posted by mathowie on Jan 21, 2000 - 5 comments

Page: 1