254 posts tagged with hacking.
Displaying 1 through 50 of 254. Subscribe:

“...western consensus over what to do about Russia remains elusive.”

Aleppo, Ukraine, Cyber Attacks, Baltic Threats: What Should We Do About Putin? [The Guardian] “The challenge presented by Russia is one of the biggest facing the next US president. Some analysts say Putin is taking advantage of Obama’s lame duck status to create “facts on the ground” in Syria. The Russian president is said to anticipate a further deterioration in bilateral relations if Hillary Clinton wins. The two have a history of personal dislike, dating back to Clinton’s time as secretary of state. “She says she sees in him a cold-blooded, self-enriching KGB agent and a bully; he remembers how she appeared to encourage street protests against him in 2011,” said analyst Leonid Bershidsky. Speaking in August, Clinton described Putin as “the grand godfather of this global brand of extreme nationalism” – lumping him with Trump, German anti-immigrant xenophobes and hard-right populists such as France’s Marine Le Pen.” [more inside]
posted by Fizz on Oct 16, 2016 - 109 comments

Putting a record on the needles

Over the previous weeks, cyber espionage group Fancy Bears has been releasing confidential WADA documents allegedly exposing a "legal" side to performance-enhancing drugs. [more inside]
posted by lmfsilva on Oct 3, 2016 - 15 comments

Attacks continued to become more frequent, persistent, and complex

Who is trying to see what it would take to shatter the internet's backbone? "Someone is extensively testing the core defensive capabilities of the companies that provide critical Internet services... [T]his is happening. And people should know. " (SLSchneier)
Other Schneier on the blue in the past.
posted by doctornemo on Sep 15, 2016 - 68 comments

NSA malware released by "The Shadow Brokers"

Was the N.S.A. Hacked? A group calling itself The Shadow Brokers [Google cache], widely supposed to actually be Russian state-backed hackers, released an archive of purported NSA Tailored Access Operations/'Equation Group' malware, including zero-day exploits on commercial routers. NSA insiders confirm likely legitimacy. The archive dates to mid-2013, shortly after the Snowden revelations, leading him and others to ponder whether the resulting cleanup operation shut out the hackers. Schneier guesses the timing was meant to signal the Obama administration against sanctions for the DNC hack.
posted by p3on on Aug 17, 2016 - 51 comments

Let's play Global Thermonuclear War: lasting impacts of WarGames

If, after the media dubbed Ronald Reagan's Strategic Defense Initiative (YT video, Wikipedia) as "Star Wars" (transcript) in 1983, you might quesiton his concerns triggered from another movie mere months later. But after watching WarGames, he was informed that "the problem is much worse than you think." WarGames was that accurate thanks in part to input in the script from an engineer named Willis Ware, who had concerns about network security (PDF) for decades before the movie. Reagan's fears lead to the first cybersecurity directive from any U.S. President and the first concerns about the NSA's potential role in "data base oversight" (Google books preview), as well as an attempt to regulate teenagers and teenaged technology (Gbp) that impacts US internet use to this day. And then there was the USSR computer program that nearly triggered WWIII. What a year. [more inside]
posted by filthy light thief on Jul 13, 2016 - 20 comments


The Apple II game Gumball is fairly obscure. Copies are very hard to find in the wild, and cracks are uncommon because of devious copy protection. The brilliant Apple II cracker 4am works at the Internet Archive (previously), and recently broke its copy protection and made it playable online. Along the way he found an easter egg that no one had discovered in 33 years, which was confirmed by the game's developer. [more inside]
posted by JHarris on Jun 10, 2016 - 33 comments


Sleep is more than the sum of its socio-economic consequences. A new generation is planting sleep in a broader spectrum of consciousness. The poles aren’t asleep and awake–they’re omniscient and dead.😉
K-HOLE, the "internet trend forcasting group", has followed up its 2015 report on Chaos Magic with what appears to be a legit report on how Sillicon Valley is monitizing sleep. (if the actual article is too sleep inducing, Ars has a write up)
posted by rebent on May 5, 2016 - 49 comments

Before Snowcrash, before Ghost in the Shell

There was 1990's Cyberpunk documentary (SLYT)
posted by I-baLL on May 2, 2016 - 25 comments

Hacking the Hacking Team

Phineas Fisher Hacks Back! Last year, an Italian company best known for selling surveillance software to governments was hacked. Phineas Fisher gives an overview of how he gained access to the Hacking Team's network.
posted by zabuni on Apr 18, 2016 - 12 comments

How to Hack an Election

"For eight years, Sepúlveda, now 31, says he traveled the continent rigging major political campaigns... Many of Sepúlveda’s efforts were unsuccessful, but he has enough wins that he might be able to claim as much influence over the political direction of modern Latin America as anyone in the 21st century."
posted by cudzoo on Mar 31, 2016 - 16 comments

still better than using punchcards tho

Internet person SethBling has successfully coded Flappy Bird inside of Super Mario World, by hand, by playing SMW on actual Super Nintendo hardware in a very peculiar way. Full hour-long process. SethBling's notes for the process. (Previously, on MetaFilter: injecting code in SMW; glitching SMW.)
posted by cortex on Mar 28, 2016 - 40 comments

John McAfee Reveals How He'd Crack An iPhone

Given the simplicity of this approach one might well wonder why the FBI hasn't done this already. The answer turns out to be straightforward: as some of our more astute readers may have noticed, it's a load of drivel. What he's proposing isn't just wrong; it's not even in the same zip code as the truth.
posted by veedubya on Mar 1, 2016 - 67 comments

George Hotz Is Taking On Google And Tesla By Himself.

The first person to hack the iPhone built a self-driving car. In his garage.
posted by ellieBOA on Jan 26, 2016 - 32 comments

wake up little boy, daddy's looking for you

A family living in Washington is speaking out about the horrors they experienced while operating a baby monitor inside their 3-year-old son's bedroom. [more inside]
posted by ChurchHatesTucker on Jan 19, 2016 - 69 comments

Preserving Apple II history, one disk at a time

Apple II hacker 4am has cracked hundreds of disks, removing protection schemes and not only posting the unprotected software to the Internet Archive where it can be run in your browser, but also posting detailed and entertaining (to a certain mindset) descriptions of how he did it (click the "Download text" option on each item to read -- here's the one for BurgerTime). Jason Scott explains.
One such crack that's generally playable without learning many keys is Pac-Man (Datasoft version).
For news on new cracks and generally interesting related stuff, there's 4am's Twitter feed. [more inside]
posted by JHarris on Jan 6, 2016 - 31 comments

Juniper systems hack

Firewalls from Juniper Network have been revealed as having a back door which permitted system-level access and the ability to read VPN traffic. Juniper has released emergency patches to fix the vulnerability. The affected equipment is heavily used by the US government.
posted by Chocolate Pickle on Dec 18, 2015 - 47 comments

Cyberattacks are increasingly common. The power grid is vulnerable.

Cybersecurity is an increasingly important concern. The Washington Post recently ran a great special series on the issue. The rate of major hacks is growing. The power grid is especially vulnerable, and a hack on it will be especially damaging. It's not a question of if, but when. [more inside]
posted by Sleeper on Dec 9, 2015 - 44 comments

"Damn you. Where's the disc?"

Stylish supercut of 70s and 80s hacking scenes.
posted by Sebmojo on Dec 1, 2015 - 28 comments

I just bought a magazine that came with a free computer.

The new Raspberry Pi Zero is so cheap and so small the first 10000 of them are being given away free on the cover of a magazine. [more inside]
posted by Just this guy, y'know on Nov 26, 2015 - 105 comments

"I felt a little bit f'ed over after the last conference call with them"

In 2013 computer researcher David Kriesel discovered that certain Xerox scanners were altering numbers in the documents they scanned (MeFi post) At the recent FrOSCon, Kriesel gave an hour-long talk recounting his experiences discovering and reporting the problem, with lots of details on what it was like dealing with a large multi-national corporation like Xerox, and what the impacts and fall-out of his discovery have been. (SPOILER: Germany has eliminated JBIG2 as a legally admissible scan format.)
posted by benito.strauss on Aug 26, 2015 - 20 comments


Following up on their promise last month to release the data they hacked from Ashley Madison (the online infidelity-enablement site) hackers have released a ship-load personal information on ASM users. The hackers claim it is more of an attack on the shady business practices of the corporation than the users. (Though in contrast to other hacks, it looks like ASM managed to do a better job of storing passwords semi-securely). But certainly a lot of people's private issues are now public, including 10,000 folks with government emails, and many writers are warning: "Don't be smug, this is only the beginning. And Wired has some useful advice on checking out if you or a loved one is among the hacked data: Don't.
posted by Potomac Avenue on Aug 19, 2015 - 396 comments

Blackhat 2015 Keynote

End of the Internet Dream? - by Jennifer Granick This field should be in the lead in evolving a race, class, age, and religiously open society, but it hasn’t been. We could conscientiously try to do this better. We could, and in my opinion should, commit to cultivating talent in unconventional places.

Today, the physical design and the business models that fund the communications networks we use have changed in ways that facilitate rather than defeat censorship and control.
posted by CrystalDave on Aug 18, 2015 - 49 comments

Notoriety and Wassenaar

Hacking Team: A Zero-Day Market Case Study
posted by alby on Jul 25, 2015 - 13 comments

Hackers Remotely Control Jeep Cherokee

Security researchers Charlie Miller (@0xcharlie) and Christopher Valasek (@nudehaberdasher) have found an exploit for Chrysler's Uconnect infotainment system allowing for remote control of many vehicle functions including climate control, audio, braking, and under certain conditions, steering. They plan to release details during a talk at next month's DEFCON 23 hacking conference. Chrysler has already issued a patch for the vulnerability, but it requires a manual update.
posted by Small Dollar on Jul 21, 2015 - 133 comments

Ashley Madison has been hacked.

Cheating website AshleyMadison has reportedly been hacked. Besides snippets of account data apparently sampled at random from among some 40 million users across ALM’s trio of properties, the hackers leaked maps of internal company servers, employee network account information, company bank account data and salary information. They want the site taken down, not because of the cheating, but because the company offers a "total delete" function and charges for it, but doesn't actually do it.
posted by nevercalm on Jul 20, 2015 - 98 comments

"Mr. The Plague, he's around, and one of my friends hollers at him"

Hackers was a financial flop, but its hilariously over-the-top early CGI visuals, oddly prescient view on technology, and glam-cyberpunk aesthetic rendered it a cult classic. To honor its 20th anniversary—at a time dogged by newfound fears about what the future of technology holds—we thought it would be fitting to bring together a group of actual hackers to screen and discuss the film. - Hackers watch "Hackers"
posted by Artw on Jun 26, 2015 - 89 comments

Cardinals vs. Astros: Information Security Edition

Last summer, ten months worth of the Houston Astros' confidential notes on trades and acquisitions leaked onto the web. The FBI now thinks the St. Louis Cardinals were behind the breach. [more inside]
posted by DirtyOldTown on Jun 16, 2015 - 64 comments

Have you turned it off and on again?

FAA (pdf link): A Boeing Model 787 airplane that has been powered continuously for 248 days can lose all AC electrical power due to the generator control units (GCUs) simultaneously going into failsafe mode. This condition is caused by a software counter internal to the GCUs that will overflow after 248 days of continuous power. We are issuing this airworthiness directive to prevent loss of all AC electrical power, which could result in loss of control of the airplane. Guardian article: "In the latest of a long line of problems plaguing Boeing’s 787 Dreamliner, which saw the company’s fleet grounded over battery issues and concerns raised over possible hacking vulnerabilities, the new software bug was found in plane’s generator-control units." [more inside]
posted by RedOrGreen on May 1, 2015 - 77 comments

People Who Could Really Break the Internet

People Who Could Really Break the Internet
posted by MattMangels on Mar 6, 2015 - 31 comments

I prefer to be called a hacker.

I Know This! is a game about movie-hacking. (via) [more inside]
posted by curious nu on Feb 20, 2015 - 8 comments

Chilling Effects

We Should All Step Back from Security Journalism. I’ll Go First. Quinn Norton (previously) responds to the sentencing of Barrett Brown (previously.) [Via]
posted by homunculus on Jan 23, 2015 - 34 comments

Redditor does the research behind the Sony Pictures hacking scandal.

Redditor CSMastermind composes an epic timeline of the Sony information breach. Well sourced, and in laymans terms. [more inside]
posted by butterstick on Dec 21, 2014 - 100 comments

I know who you are and I saw what you did.

How secure is public wi-fi? A lot less than you probably imagine.
posted by Obscure Reference on Oct 20, 2014 - 52 comments

clearly a lab computer!

Sentenced in a Swedish court, Gottfrid Svartholm Warg gets extradited to Denmark to stand trial for another case of system intrusion.

Mefi's Own, Jacob Applebaum has some choice words after his testimony in the Danish court. [more inside]
posted by xcasex on Sep 21, 2014 - 25 comments

5 million gmail accounts compromised

Last night, a hacker posted a text file on a cryptocurrency forum in Russia which contained 5 million Gmail accounts and associated passwords. It's probably time to change yours again.
posted by Chocolate Pickle on Sep 10, 2014 - 94 comments

"It seems like a dead wire leading nowhere."

How does a Dell laptop know what kind of power adapter is connected? The adapter tells it. Reverse-engineering: Hacking the Dell laptop power adapter 1, 2, 3, 4.
posted by We had a deal, Kyle on Sep 2, 2014 - 50 comments


How to Use Your Cat to Hack Your Neighbor’s Wi-Fi.
posted by homunculus on Aug 9, 2014 - 59 comments

A quantum leap in computer games from Protovision.

1980s computer hacking supercut. [more inside]
posted by Chrysostom on Jul 24, 2014 - 49 comments

Estimated 20 million cyberattacks per day against locations within Utah.

Who's hacking whom? U.S.-based computer security firm Norse has released a real-time animated map that illustrates ongoing cyberattacks around the world.
posted by Obscure Reference on Jun 30, 2014 - 33 comments

"What would work even against an infosec guy? Linkedin invites."

How I Hacked Your Router
posted by the man of twists and turns on Apr 6, 2014 - 63 comments

18 million reasons to go to two-factor authentication

German authorities have discovered yet another giant database of hacked passwords. The German Federal Office for Information Security says it will have a website allowing people to check if their accounts are affected up and running by Monday. Some 3 million Germans are believed affected; there is no indication that the impact is limited to Germans or Germany. A link to an ARD article on the case is here, in German.
posted by rhombus on Apr 4, 2014 - 26 comments

The Ghost in MIT

The inside story of MIT and Aaron Swartz. The Boston Globe reviews over 7,000 pages of discovery documents in the Aaron Swartz case (previously): Most vividly, the e-mails underscore the dissonant instincts the university grappled with. There was the eagerness of some MIT employees to help investigators and prosecutors with the case, and then there was, by contrast, the glacial pace of the institution’s early reaction to the intruder’s provocation.... MIT never encouraged Swartz’s prosecution, and once told his prosecutor they had no interest in jail time. However, e-mails illustrate how MIT energetically assisted authorities in capturing him and gathering evidence — even prodding JSTOR to get answers for prosecutors more quickly — before a subpoena had been issued.... Yet if MIT eventually adopted a relatively hard line on Swartz, the university had also helped to make his misdeeds possible, the Globe review found. Numerous e-mails make it clear that the unusually easy access to the campus computer network, which Swartz took advantage of, had long been a concern to some of the university’s information technology staff.
posted by Cash4Lead on Mar 31, 2014 - 53 comments

"irresistible high-low raw material for an online news cycle"

From a small town in Romania, Guccifer skewered and glorified the power elite.
If Snowden perfectly fit the profile of geek crusader, Lehel, a stone-faced, disheveled man in a tight leather jacket, seemed an odd candidate for one of the world’s most notorious hackers. But Guccifer is to hacking what the Beatles are to rock and roll. He had predecessors, 4Chan cowboys like Anonymous and Sabu of LulzSec, but he’s changed the nature of hacking fame. Guccifer rose by exploiting the connections people make online to infiltrate the private lives of some of the most powerful people on Earth. He served up the results to the media, irresistible high-low raw material for an online news cycle driven by leaks and voyeurism and racked by anxiety over privacy.
What Is A Guccifer? [more inside]
posted by the man of twists and turns on Jan 27, 2014 - 12 comments

Aaron Swartz

Losing Aaron. "After his son was arrested for downloading files at MIT, Bob Swartz did everything in his power to save him. He couldn’t. Now he wants the institute to own up to its part in Aaron’s death." [Via]
posted by homunculus on Jan 5, 2014 - 32 comments

"they run a body of code that can be modified"

On Hacking MicroSD Cards
posted by the man of twists and turns on Dec 30, 2013 - 13 comments

The First Botnet, 25 Years Ago Today

How a grad student trying to build the first botnet brought the Internet to its knees. via
posted by nevercalm on Nov 3, 2013 - 7 comments

"This is the voice of Vrillon..."

The alien cult that hacked British TV: In 1977 a British television channel was hijacked by someone claiming to be a space alien called ‘Vrillon’. [Via]
posted by homunculus on Sep 23, 2013 - 14 comments

Innovation or Exploitation

The Limits of Computer Trespass Law (Lengthy video with audio available) "Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law!" Legal and internet thinkers (including Ed Felten, Jennifer Granick, Dan Auerbach, & others) talk about vagueness in the Computer Fraud and Abuse Act, chilling effects, and the prosecution of Aaron Swartz in a panel discussion at Stanford's Center for Internet and Society. [more inside]
posted by gauche on Aug 29, 2013 - 16 comments

How to: make a microscope from a webcam

Create a high-powered microscope from a cheap webcam by following Mark's simple step-by-step instructions. Because your microscope is connected to your computer, you can save and share your images easily.
posted by nickyskye on Aug 9, 2013 - 26 comments

Breaking: NSA conducts espionage on foreign targets

In an interview with Hong Kong's South China Morning Post, NSA leaker, Edward Snowden, claims that the US is "trying to bully the Hong Kong government" into extraditing him, and provides new documents which describe the NSA's routine hacking of targets in Hong Kong and mainland China since 2009, including regular access of large backbone networks. [more inside]
posted by pjenks on Jun 12, 2013 - 938 comments

Page: 1 2 3 4 5 6