Latest Hackers: Heroes of the Computer Revolution Stories

Foxconn Hacked In Protest Of Labor Conditions
2012-02-10 12:54:45

Asia-based Foxconn, contract manufacturer to hardware makers including Apple, Samsung and IBM, had its internal network hacked yesterday as part of a series of protests against the company´s working conditions. Swagg Security, a hacking group, says it forced its way into the company´s systems by exploiting a vulnerability of a staff member´s computer using an old version of Internet Explorer, reports Emma Woolacott for TG Daily. Foxconn has since closed the relevant...

After Extortion Attempt, Hacker Releases Symantec Source Code
2012-02-08 08:25:26

Source code belonging to Symantec Corporation that had been stolen in 2006 and held for ransom over the past month has been released by a group apparently associated with the hacking collective Anonymous. Symantec recently confirmed to CNET that law enforcement posing as employees of the antivirus firm had been in contact with a hacker known as Yamatough, who tried to get $50,000 out of the company to keep the code private. Negotiations, which transpired between the hacker and a person...

Media-Hired Hackers Target Gordon Brown’s Emails
2012-01-02 14:28:33

One of England´s premier newspapers The Independent reported on Monday that British police had uncovered evidence that former Prime Minister Gordon Brown´s email account may have been hacked by private investigators hired by big name newspapers. Moreover, it appears that then-Finance Minister Gordon Brown was not the only victim. The Independent reported that London´s famous Scotland Yard was examining some 20 confiscated computers and had evidence that hundreds of...

US Chamber Of Commerce Quietly Shut Down Chinese Hackers
2011-12-21 09:47:31

It is believed that hackers, based in China, gained access to America´s top business-lobbying group, the US Chamber of Commerce. It is not known when the initial break-in occurred but security officials from the Chamber quietly shut the breech down in May of 2010, Nicholas Wadhams of Bloomberg reports. The hackers gained access to everything stored on its systems, including information about its three million members, and was one of the boldest known infiltrations in what has become a...

RIM’s PlayBook Rooted With Hack Named Dingleberry
2011-12-01 11:05:32

Research In Motion´s Blackberry devices are known for their robust security, in fact it could be argued that it may be its only remaining selling feature. However a trio of hackers have found a way to crack the OS of the Blackberry Playbook with the schoolboy-inspired name "dingleberry," CNET´s Eric Mack is reporting. RIM, in a response to questions about the hack, is looking into the claim, and if a jailbreak is confirmed has pledged to release a patch to plug the possible...

Electronic Voting Machines Are Unsafe From Hackers
2011-10-01 07:10:25

Computer scientists have demonstrated a way that hackers can use off-the-shelf hardware to tamper with electronic voting machines. The Diebold AccuVote TS electronic voting machine will be used to cast ballots for the 2012 presidential elections. A hacker could insert a small circuit board between the components connecting the touch screen of the device to its microprocessor. The $10.50 card then controls the information flowing into the machine's internal processor, which allows...

Hackers Used MySQL.com To Help Distribute Malware
2011-09-27 12:50:06

The website hosting the open-source MySQL was hacked on Monday to help serve up malware to Internet users. Hackers installed JavaScript code onto MySQL.com that tricked users into updating out-of-date browsers or unlatched versions of Adobe Flash, Reader or Java on their Windows PC. Armorize researchers said the hack caused people visiting the site to be redirected to a site to install malware using code from the Blackhole exploit kit. Wayne Huang, Armorize's CEO, said his team has...

2011-08-06 05:35:00

The US Defense Department is recruiting hackers to help it bolster its defenses against cyberattacks, a former hacker now working with the government said on Thursday. The program, known as Cyber Fast Track, was announced by Peiter Zatko during a keynote speech at the Black Hat conference in Las Vegas, according to John D. Sutter of CNN.com. The program, he says, "is aimed at hackers and computer security experts" and officially launched Wednesday. According to Tabassum Zakaria of Reuters,...

2011-08-03 05:45:00

News International said on Tuesday that thousands of people who entered competitions on The Sun website may have had personal information stolen. The publisher said the data was taken when the site was hacked on July 19. The company said it had reported the matter to the police and the Information Commissioner. News International said in a statement: "We take customer data extremely seriously and are working with the relevant authorities to resolve this matter. "We are directly contacting...

2011-07-07 11:35:00

Security experts are saying that hackers have disclosed a bug in Apple Inc.'s mobile operating system that could be exploited by criminals looking to gain remote access over iPhones, iPads and iPod Touch devices. The security flaw in Apple's iOS was noticed Wednesday as the website www.jailbreakme.com released code that Apple customers can use to modify the iOS operating system. Some Apple customers choose to "jail break" their devices so they can download and run applications Apple did not...

Word of the Day
  • A murmuring sound; a rushing or whistling sound, like that of the wind; a deep sigh.
  • A gentle breeze; a waft; a breath.
  • Any rumor that engages general attention.
  • A cant or whining mode of speaking, especially in preaching or praying; the chant or recitative characteristic of the old Presbyterians in Scotland.
  • To make a rushing, whistling, or sighing sound; emit a hollow murmur; murmur or sigh like the wind.
  • To breathe in or as in sleep.
  • To utter in a whining or monotonous tone.
According to the OED, from the 16th century, this word is 'almost exclusively Scots and northern dialect until adopted in general literary use in the 19th.'