Category: Hacking
Zune Hacks – Yes, It’s True, You Can Hack and Modify Your Zune!
While it remains to be seen whether the Microsoft Zune will be the iPod killer that they hope it to be, there is one way in which it has already taken the lead: Zune hacks. The Zune can be hacked (i.e. modified) in many ways, while most are afraid to hack their iPod at all.
Help Wanted: Hack Our One $100 2B1 Laptop Per Child Laptop
The 2B1 “one laptop per child” initiative, also known as the $100 laptop project, is looking for experienced hackers to try to hack the $100 2B1 laptop, so that they can trouble shoot its security issues. But what I want to know is, how many of those laptops will stay with the children, and how many will get sold by their families for food?
Home PCs at Greatest Risk of Security Attack
A new report out by online security firm Symantec indicates that the fastest and largest growing sector of online security attacks are attacks against home users and their computers.
Hometown Favorites – Would You Like Phish with Your Candy?
Hometown Favorites is being used as phish bait, and it appears that someone has breached their customer list. The phish being sent out in their name warns customers that “We recently tried to charge your credit card for your HomeTownFavorites.com order, and it was rejected by the bank because it has no complete infomation.”
Motion Picture Association (MPAA) Accused of Hacking – Hires exTorrentSpy Employee Robert Anderson to Break Into TorrentSpy Servers
TorrentSpy, run by Valence Media, has accused the MPAA of hacking into their computers by hiring an ex-employee, Robert Anderson, to hack into their servers. Not uncoincidentally, TorrentSpy was on the receiving end of a lawsuit by the MPAA just a few months previous.
Gary McKinnon, the NASA Hacker Known as Solo, to be Extradited
Gary McKinnon, the hacker known as “Solo”, who infamously hacked into NASA and Pentagon computers, and who claimed that once there he found dozens of other hackers, and proof of aliens, has lost his fight against extradition to the United States for prosecution.
Keyboard Sound Spying Gives Away What’s Being Typed
Key clicks and other keyboard sounds reveal everything you are typing, all with a simple decoding program which turns keyclicks into their associated letters. In fact, the keyboard clicks allow spies to very accurately determine what you are typing. Researches say that keyboard click spying has a 96% accuracy.
Paris Hilton’s Teen DFNCTS Hacker Pleads Guilty – Member of Defonic Crew Team Screen Name Club
The Defonic Crew, also known as the Defonic Team Screen Name Club, or just DFNCTSC for short, is the hacking group to which the young hacker who hacked Paris Hilton’s Sidekick belonged. Now the youngest member of Defonic Crew has pleaded guilty to the hacking.
Millions of Windows Users at Risk by Massive ID and Bank Account Theft Piggybacking on CoolWebSearch
The implications are staggering. Internet security software company Sunbelt Software was investigating CoolWebSearch, a spyware package, when they noticed that stowing away in the CoolWebSearch download were two trojans, a spam zombie engine, and a keystroke logging program. It was the keylogger program which took their breath away. The keystroke…
What is Bluejacking?
Aunty has had several people ask her recently what “Bluejacking” is. Bluejacking is really just another name for Bluespam, or for what the Car Whisperer does. Wikipedia defines “Bluejacking” as “the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers.” This also…
The Car Whisperer: Eavesdrop On and Take Part In Nearby Bluetooth Conversations (a/k/a Bluejacking)
Meet the Car Whisperer. We told you it could happen. Remember the BlueSniper “Rifle” which could sniff out and Bluejack Bluetooth devices up to a half-mile away? And the Bluetooth Bluespam being sent to movie-goer’s phones? [Oh sure, the company called it “ringtones” and “wallpaper”, but we all know better.]…
Hackers, Government Unite to Take Down Terrorist Websites
Hacking and politics have contrived to make strange bedfellows. According to a report by the British news organization, The Sun, hackers have come forward and started to take down web sites which are fomenting terrorism, and inciting terrorist acts – something which the government cannot do with any sort of…
Are the Chinese Stealing U.S. Corporate Secrets Through Internet Worms?
Are the Chinese stealing U.S. corporate trade and other secrets through the use of computer worms and trojans? According to at least one security expert, the answer is “yes”. Joe Stewart, with U.S. security company Lurhq, claims that a new worm called “Myfip” is being used to steal U.S. corporate…
Hack Causes Doctor’s Answering System to Answer with Passionate Moans
The concept of “first, do no harm” apparently doesn’t extend to those who provide support services for doctors, as a founder of a medical answering service has been charged with hacking into a competitor’s service, and rearranging the system so that calls to the doctors were met with the passionate…
Nasa Hacker: “I Found More Hackers There. And Aliens Too”
Gary McKinnon, the extra-terrestrial-seeking Nasa hacker who was apprehended last month, has explained how he managed to hack into Nasa’s computers, along with those of several other government agencies, and what he found there. According to the 39-year old Londoner, he simply searched for senior network administrators who didn’t use…