The Internet Patrol default featured image
Continue Reading

Zune Hacks – Yes, It’s True, You Can Hack and Modify Your Zune!

While it remains to be seen whether the Microsoft Zune will be the iPod killer that they hope it to be, there is one way in which it has already taken the lead: Zune hacks. The Zune can be hacked (i.e. modified) in many ways, while most are afraid to hack their iPod at all.

The Internet Patrol default featured image
Continue Reading

Help Wanted: Hack Our One $100 2B1 Laptop Per Child Laptop

The 2B1 “one laptop per child” initiative, also known as the $100 laptop project, is looking for experienced hackers to try to hack the $100 2B1 laptop, so that they can trouble shoot its security issues. But what I want to know is, how many of those laptops will stay with the children, and how many will get sold by their families for food?

The Internet Patrol default featured image
Continue Reading

Home PCs at Greatest Risk of Security Attack

A new report out by online security firm Symantec indicates that the fastest and largest growing sector of online security attacks are attacks against home users and their computers.

The Internet Patrol default featured image
Continue Reading

Hometown Favorites – Would You Like Phish with Your Candy?

Hometown Favorites is being used as phish bait, and it appears that someone has breached their customer list. The phish being sent out in their name warns customers that “We recently tried to charge your credit card for your HomeTownFavorites.com order, and it was rejected by the bank because it has no complete infomation.”

The Internet Patrol default featured image
Continue Reading

Motion Picture Association (MPAA) Accused of Hacking – Hires exTorrentSpy Employee Robert Anderson to Break Into TorrentSpy Servers

TorrentSpy, run by Valence Media, has accused the MPAA of hacking into their computers by hiring an ex-employee, Robert Anderson, to hack into their servers. Not uncoincidentally, TorrentSpy was on the receiving end of a lawsuit by the MPAA just a few months previous.

The Internet Patrol default featured image
Continue Reading

Gary McKinnon, the NASA Hacker Known as Solo, to be Extradited

Gary McKinnon, the hacker known as “Solo”, who infamously hacked into NASA and Pentagon computers, and who claimed that once there he found dozens of other hackers, and proof of aliens, has lost his fight against extradition to the United States for prosecution.

The Internet Patrol default featured image
Continue Reading

Keyboard Sound Spying Gives Away What’s Being Typed

Key clicks and other keyboard sounds reveal everything you are typing, all with a simple decoding program which turns keyclicks into their associated letters. In fact, the keyboard clicks allow spies to very accurately determine what you are typing. Researches say that keyboard click spying has a 96% accuracy.

The Internet Patrol default featured image
Continue Reading

Paris Hilton’s Teen DFNCTS Hacker Pleads Guilty – Member of Defonic Crew Team Screen Name Club

The Defonic Crew, also known as the Defonic Team Screen Name Club, or just DFNCTSC for short, is the hacking group to which the young hacker who hacked Paris Hilton’s Sidekick belonged. Now the youngest member of Defonic Crew has pleaded guilty to the hacking.

The Internet Patrol default featured image
Continue Reading

Millions of Windows Users at Risk by Massive ID and Bank Account Theft Piggybacking on CoolWebSearch

The implications are staggering. Internet security software company Sunbelt Software was investigating CoolWebSearch, a spyware package, when they noticed that stowing away in the CoolWebSearch download were two trojans, a spam zombie engine, and a keystroke logging program. It was the keylogger program which took their breath away. The keystroke…

The Internet Patrol default featured image
Continue Reading

What is Bluejacking?

Aunty has had several people ask her recently what “Bluejacking” is. Bluejacking is really just another name for Bluespam, or for what the Car Whisperer does. Wikipedia defines “Bluejacking” as “the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers.” This also…

The Internet Patrol default featured image
Continue Reading

The Car Whisperer: Eavesdrop On and Take Part In Nearby Bluetooth Conversations (a/k/a Bluejacking)

Meet the Car Whisperer. We told you it could happen. Remember the BlueSniper “Rifle” which could sniff out and Bluejack Bluetooth devices up to a half-mile away? And the Bluetooth Bluespam being sent to movie-goer’s phones? [Oh sure, the company called it “ringtones” and “wallpaper”, but we all know better.]…

The Internet Patrol default featured image
Continue Reading

Hackers, Government Unite to Take Down Terrorist Websites

Hacking and politics have contrived to make strange bedfellows. According to a report by the British news organization, The Sun, hackers have come forward and started to take down web sites which are fomenting terrorism, and inciting terrorist acts – something which the government cannot do with any sort of…

The Internet Patrol default featured image
Continue Reading

Are the Chinese Stealing U.S. Corporate Secrets Through Internet Worms?

Are the Chinese stealing U.S. corporate trade and other secrets through the use of computer worms and trojans? According to at least one security expert, the answer is “yes”. Joe Stewart, with U.S. security company Lurhq, claims that a new worm called “Myfip” is being used to steal U.S. corporate…

The Internet Patrol default featured image
Continue Reading

Hack Causes Doctor’s Answering System to Answer with Passionate Moans

The concept of “first, do no harm” apparently doesn’t extend to those who provide support services for doctors, as a founder of a medical answering service has been charged with hacking into a competitor’s service, and rearranging the system so that calls to the doctors were met with the passionate…

The Internet Patrol default featured image
Continue Reading

Nasa Hacker: “I Found More Hackers There. And Aliens Too”

Gary McKinnon, the extra-terrestrial-seeking Nasa hacker who was apprehended last month, has explained how he managed to hack into Nasa’s computers, along with those of several other government agencies, and what he found there. According to the 39-year old Londoner, he simply searched for senior network administrators who didn’t use…