recentpopularlog in

joeybaker : hacktivist   134

« earlier  
Saudi Arabia "Davos in the Desert" website hacked with image of Jamal Khashoggi being executed by crown prince
The hackers also made claims about Saudi Arabia’s financing of terrorism around the globe.
october 2018 by joeybaker
Pirates Crack Microsoft’s UWP Protection, Five Layers of DRM Defeated
Video games pirates have reason to celebrate today after scene cracking group CODEX defeated Microsoft’s Universal Windows Platform system on Zoo Tycoon Ultimate Animal Collection. While the game it was protecting isn’t exactly a fan favorite, it was reportedly protected by five layers of DRM within the UWP package, including the Denuvo-like Arxan anti-tamper technology.
intellectualProperty  hacktivist 
march 2018 by joeybaker
Something Happened to Activist Email Provider Riseup, but It Hasn’t Been Compromised
Over the last week, rumors have been spreading across the digital activist community that the technology collective riseup, which provides email, chat, VPN, and other services to activists, may be
informationObscurity  hacktivist 
november 2016 by joeybaker
Using Wi-Fi to Detect Hand Motions and Steal Passwords
This is impressive research: "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals": Abstract: In this study, we present WindTalker, a novel and practical keystroke
informationSecurity  hacktivist 
november 2016 by joeybaker
Meet PoisonTap, the $5 tool that ransacks password-protected computers
Samy Kamkar The perils of leaving computers unattended just got worse, thanks to a newly released exploit tool that takes only 30 seconds to install a privacy-invading backdoor, even when the machine
informationSecurity  hacktivist 
november 2016 by joeybaker
Fooling Facial Recognition Systems
This is some interesting research. You can fool facial recognition systems by wearing glasses printed with elements of other peoples' faces. Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael
surveillanceState  hacktivist 
november 2016 by joeybaker
Another Shadow Brokers Leak
There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here and here, Monday's dump contains 352
hacktivist  surveillanceState  informationWar 
november 2016 by joeybaker
Justice Department Releases Guidelines on Controversial Anti-Hacking Law
To many who conduct work or research related to digital security, the legislation meant to protect against computer crimes has morphed into something harmful. The 1986 law, the U.S. Computer Fraud
governmentIncompetence  hacktivist  governmentOverreach 
october 2016 by joeybaker
Attacks that disrupted Twitter, Paypal, Spotify were just a dry run, hackers say
Could millions of connected cameras, thermostats and kids' toys bring the internet to its knees? It's beginning to look that way. On Friday, epic cyberattacks crippled a major internet firm,
corporateIndemnity  informationWar  informationSecurity  corporateCorruption  hacktivist 
october 2016 by joeybaker
Hacking an election is about influence and disruption, not voting machines
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some
digitalDemocracy  hacktivist  informationSecurity 
october 2016 by joeybaker
The Culture of Cybersecurity
Interesting survey of the cybersecurity culture in Norway. 96% of all Norwegian are online, more than 90% embrace new technology, and 6 of 10 feel capable of judging what is safe to do online. Still
policeIncompetence  informationObscurity  surveillanceState  hacktivist  webWeWant  informationSecurity 
october 2016 by joeybaker
iPhone passcode bypassed with NAND mirroring attack
Enlarge / Computer security expert Sergei Skorobogatov demonstrates how to recover an iPhone 5C passcode.Sergei Skorobogatov/YouTube Passcodes on iPhones can be hacked using store-bought electronic
governmentLies  hacktivist 
september 2016 by joeybaker
Recovering an iPhone 5c Passcode
Remember the San Bernardino killer's iPhone, and how the FBI maintained that they couldn't get the encryption key without Apple providing them with a universal backdoor? Many of us computer-security
governmentOverreach  surveillanceState  governmentIncompetence  hacktivist 
september 2016 by joeybaker
Privacy and control need to be put back into the hands of the individual – Decentralize Today
Corruption and oppression go hand in hand. Nothing exemplifies this more than the recent news from China that their corrupt and oppressive government has recently shut down several online news
hacktivist  informationSecurity  globalUnrest  theUserIsTheProduct  cryptocurrency  encryptionWars  censorship 
september 2016 by joeybaker
Guccifer, hacker who revealed Clinton’s use of a private email address, sentenced to 52 months
The Romanian hacker who first revealed that Hillary Clinton used a private email address while she was secretary of state was sentenced to more than 4 years in federal prison Thursday by a U.S.
hacktivist  governmentIncompetence 
september 2016 by joeybaker
Companies Can’t Legally Void the Warranty for Jailbreaking or Rooting Your Phone
After I published an article about how electronics manufacturers including Microsoft and Sony illegally void the warranties of consumers who open their devices, I got a flood of emails from people
corporateCorruption  intellectualProperty  win  hacktivist  corporateIndemnity 
august 2016 by joeybaker
Hacked Emails Reveal NATO General Plotting Against Obama on Russia Policy
Retired U.S. Air Force Gen. Philip Breedlove, until recently the supreme commander of NATO forces in Europe, plotted in private to overcome President Barack Obama
governmentLies  hacktivist  governmentIncompetence  win 
july 2016 by joeybaker
Errata Security: Etherium/TheDAO hack simplified
The news in the Bitcoin world is the Ethereum/DAO hack. I thought I'd write up a simplified explanation. What is Bitcoin? I'm sure you know, or have an idea what Bitcoin is, but I'll explain it again
digitalDemocracy  informationSecurity  hacktivist  cryptocurrency 
june 2016 by joeybaker
Intel x86s hide another CPU that can take over your machine (you can't audit it)
Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll
informationObscurity  hacktivist  informationSecurity 
june 2016 by joeybaker
Guccifer 2.0 DNC’s servers hacked by a lone hacker
Worldwide known cyber security company CrowdStrike announced that the Democratic National Committee (DNC) servers had been hacked by
june 2016 by joeybaker
« earlier      
per page:    204080120160

Copy this bookmark:

to read