Blog Posts Tagged with "Hacker"
May 16, 2012 Added by:ʞɔopuooq ʇuıɐs
As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...
April 10, 2012 Added by:Anthony M. Freed
The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...
February 13, 2012 Added by:Headlines
A hacker who goes by the handles "WeedGrower" and "X-pOSed" claims to have breached tech giant Intel and to have gained access to an Intel.com subscriber database that contains sensitive information including passwords, social security and credit card numbers...
January 06, 2012 Added by:Kevin McAleavey
YamaTough provided Infosec Island with compelling evidence that he did indeed have the secret sauce and planned to release it in order to embarrass Symantec over Indian government policies towards obtaining source code to eavesdrop on cell phones and other communications...
October 13, 2011 Added by:Headlines
A man accused of targeting the entertainment industry by hacking into the personal e-mail accounts of celebrities was arrested after being charged with accessing protected computers without authorization, damaging protected computers, wiretapping, and aggravated identity theft...
September 06, 2011 Added by:Headlines
In addition to stealing financial information, Mijangos “read victims’ e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers. Often, he then used the information he obtained to play psychological games with his victims...”
August 22, 2011 Added by:Headlines
Authorities in Hong Kong have arrested a man on suspicion of conducting a cyber attack against the Hong Kong Exchange (HKEx) nearly two weeks ago. The man was detained late last week and police seized five computers, several mobile phones, and other items, according to reports...
July 22, 2011 Added by:Headlines
''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...
July 20, 2011 Added by:Headlines
Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...
July 13, 2011 Added by:cliff sull
Being left in limbo for so many years is a horrendous form of cruelty and mental torture for a crime that the High Tech Crime Unit told Gary in March 2002 would be likely to attract a sentence of 6 months community service. We live in hope of an imminent end to this nightmare...
April 13, 2011 Added by:Headlines
The charges stem from statements the hacker made April 1st on a French television program where he bragged about hacking into networks belonging to the French Army and defense contractor the Thales Group, and then claiming he also sold stolen information on Internet black markets...
April 13, 2011 Added by:Headlines
"If Evans wants to be considered a credible source of information or technical security, he needs to actually work at getting certifications and accrue respect through solid work within the community. Until he does this, he will always have critics that will call him a charlatan..."
April 08, 2011 Added by:Headlines
"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."
March 28, 2011 Added by:Headlines
The supposed lone-hacker now claiming responsibility, who dubbed him or herself "Comodohacker", said in their statement that the attack on Comodo was in retaliation for the release of the Stuxnet virus that damaged equipment at Iran's Natanz uranium enrichment facility...
March 25, 2011 Added by:Headlines
"This is the second time a well known website has been breached this week – just a few days ago it was Play.com with egg on its face, now it’s TripAdvisor. It’s the regularity of these types of incident that suggest traditional approaches to IT security are no longer fit for purpose..."
March 18, 2011 Added by:Headlines
"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013