-
+17 +1
Alleged Celeb Nude Photo Leaker's Brother Speaks Out
After over two days of silence, the family of Bryan Hamade, the internet’s main suspect in the nude celebrity photo leaks, spoke exclusively to BuzzFeed. “It’s getting to the point that my mom is being borderline-harassed by everyone,” Bryan’s brother, Andrew, said this afternoon.
-
+18 +1
Out in the Open: Hackers Build a Skype That’s Not Controlled by Microsoft
The web forum 4chan is known mostly as a place to share juvenile and, to put it mildly, politically incorrect images. But it’s also the birthplace of one of the latest attempts to subvert the NSA’s mass surveillance program. When whistleblower Edward Snowden revealed that full extent of the NSA’s activities last year, members of…
-
+3 +1
Hacker says to show passenger jets at risk of cyber attack
Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.
-
+25 +1
How to Steal an Encryption Key by Simply Touching a Laptop
Hackers have a new potential method for extracting data from computers at their fingertips—literally. According to research conducted by Eran Tromer, Daniel Genkin, and Itamar Pipman, computer security experts at Tel Aviv University, using a simple electrical trick is enough for a sophisticated attacker to gain access to encryption keys on computers.
-
+20 +1
Here's how easy it is to hack a traffic light with a laptop
In a new study, a group of computer scientists from the University of Michigan recently revealed a major vulnerability in an unlikely hacking target: traffic lights.
-
+23 +1
Hospital network hacked, 4.5 million records stolen
Hackers have taken 4.5 million Social Security numbers from patients who attended any one of Community Health Systems' 206 hospitals this year.
-
+18 +1
This Phony 'Anonymous' Site Was Set Up to Trap Ferguson Hacktivists
As military police forces gather around Ferguson, trying to quell an angry, frustrated, and betrayed population, some people are taking their fight online. 'OpFerguson', being spear-headed by members of the hacktivism collective Anonymous, launched a couple of days ago.
-
+17 +1
"Anonymous" attack disrupting Ferguson city government
Protests in the streets have not been the only disruption in the city of Ferguson since the shooting of Michael Brown by police. A cyber attack by the hacker group “Anonymous” has done more damage than any bottle or brick. The threats from “Anonymous” came shortly after the protests surrounding Brown’s death started. In a video released on YouTube, the group was specific about what it intended to do.
-
+22 +1
Hello, Dave. I control your thermostat. Google's Nest gets hacked
The immortal words of Hal, the rogue computer in 2001: A Space Odyssey, showed up on the display of a Google Nest appliance control system. That’s not supposed to happen.
-
+21 +1
The fall of the FBI’s most-wanted cybercriminal
On an unseasonably cold Saturday afternoon in March 2012, Jeremy Hammond, one of the most destructive hackers in American history, logged into his computer in his squalid Chicago duplex for the second-to-last time. His friend Sabu, a notorious hacker who had often encouraged him to attack more ambitious targets, was playfully giving him a hard time over his period offline.
-
+18 +1
How Hackable Is Your Car? Consult This Handy Chart
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your specific car vulnerable, too?
-
+2 +1
Russian hackers steal more than 1 billion passwords. Security firm seizes opportunity.
For security firms, a major online security breach is a potential marketing opportunity. The latest is legitimately scary: Russian hackers stole 1.2 billion unique username and password combinations – that’s nearly the population of China – and more than 500 million e-mail addresses, according to a New York Times story published late Tuesday.
-
+20 +1
Hacker says to show passenger jets at risk of cyber attack
Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.
-
+17 +1
600 Retailers Ensnared in Major New Malware Attack, Cybersecurity Firm Says
The Department of Homeland Security is investigating the widespread use of "Backoff" malicious software, which steals data through remote access applications
-
+20 +1
Hackers Can Control Your Phone Using a Tool That’s Already Built Into It
A lot of concern about the NSA’s seemingly omnipresent surveillance over the last year has focused on the agency’s efforts to install back doors in software and hardware. Those efforts are greatly aided, however, if the agency can piggyback on embedded software already on a system that can be exploited.
-
+22 +1
Canadian government says Chinese hackers infiltrated top research and development organization
Chinese hackers infiltrated the computer systems of Canada's top research and development organization, the Canadian government said Tuesday. Canada's Treasury Board said a "highly sophisticated Chinese state-sponsored actor" hacked into the National Research Council, which partners its scientists, engineers and business experts with private industry to bring new technologies to market.
-
+14 +1
80s Computer Hacking: A Supercut
We at Found Item Clothing love technology but sometimes it's good to consider how far we've come. We proudly present the silliest, best and iconic hacking scenes from the big screen.
1 comments by timex -
+8 +1
Hackers exploiting Internet Explorer to expose security flaws on a huge scale
Hackers and cybercriminals are using flaws in Microsoft’s Internet Explorer to search computers to discover what kinds of security software they are running and how to take control of them, security researchers claim.
-
+24 +1
What I Learned from Edward Snowden at the Hacker Conference
Whatever Snowden’s origins and affiliations, he was not coming to his audience as a peer. He was coming as a prophet, and the gospel was liberty and anonymity and privacy and security.
-
+16 +1
Snowden tells hackers of the world to unite
Edward Snowden addressed a packed-to-capacity crowd at the Hackers On Planet Earth (HOPE) conference with a message reminiscent of a line from the hacker scene's favorite campy movie: Hackers of the world, unite.
Submit a link
Start a discussion