hackers Archive

  • Stuxnet, the worm virus launched by Israel in the 2010 attack on Iran’s uranium enrichment facility.  What is a worm?  What exactly is Stuxnet? In simplest terms Stuxnet is a worm virus capable of secretly infecting a computer network and working it’s way in to the target.  During this process it does not cause any harm to the computers it uses to locate it’s target, nor does it make itself known in any way.  When it reaches the target computer it reprograms the target code in the software.  These code changes cause actual physical changes in the industrial environment which these worms were created to infiltrate, without notifying the operators of any abnormalities. Stuxnet was first discovered in July 2010 […]

    What is Stuxnet?

    Stuxnet, the worm virus launched by Israel in the 2010 attack on Iran’s uranium enrichment facility.  What is a worm?  What exactly is Stuxnet? In simplest terms Stuxnet is a worm virus capable of secretly infecting a computer network and working it’s way in to the target.  During this process it does not cause any harm to the computers it uses to locate it’s target, nor does it make itself known in any way.  When it reaches the target computer it reprograms the target code in the software.  These code changes cause actual physical changes in the industrial environment which these worms were created to infiltrate, without notifying the operators of any abnormalities. Stuxnet was first discovered in July 2010 […]

    Continue Reading...

  • If I wanted to hack into your jailbroken or unlocked iPhone I could do so in under 2 seconds. All I have to do is use SSH to attempt to access your phone and enter the username: root and the password: alpine. All iOS devices by default have the same username and password, and once jailbroken can easily be accessed. Not only that, but using a program to crack open your entire vault of stored passwords is yet another simple task for any novice hacker. Want to protect yourself? If your phone is unlocked you should have Cydia. #1 – Open Cydia #2 – Get and install TERMINAL #3 – Open TERMINAL #4 – You should see iPhoneName: ~ Mobile$ […]

    How to change the default username and password on your iPhone

    If I wanted to hack into your jailbroken or unlocked iPhone I could do so in under 2 seconds. All I have to do is use SSH to attempt to access your phone and enter the username: root and the password: alpine. All iOS devices by default have the same username and password, and once jailbroken can easily be accessed. Not only that, but using a program to crack open your entire vault of stored passwords is yet another simple task for any novice hacker. Want to protect yourself? If your phone is unlocked you should have Cydia. #1 – Open Cydia #2 – Get and install TERMINAL #3 – Open TERMINAL #4 – You should see iPhoneName: ~ Mobile$ […]

    Continue Reading...

  • You think you’re safe when you walk up to your large bank branch and slide your debit card into the ATM machine.  You are confident that everything is legit and secure when you pull up to refuel your tank and feed your credit card to the pump machine.  Your confidence is about to be shattered by something called “Skimming”.

    How to keep your Credit Cards safe from Skimmers

    You think you’re safe when you walk up to your large bank branch and slide your debit card into the ATM machine.  You are confident that everything is legit and secure when you pull up to refuel your tank and feed your credit card to the pump machine.  Your confidence is about to be shattered by something called “Skimming”.

    Continue Reading...

  • ORIGINALLY POSTED 4 FEBRUARY 2011 Today I stumbled upon a website I haven’t visited in years.  Since 1996, Cryptome.org has functioned as a repository for information about freedom of speech, cryptography, spying, and surveillance. According to the site: “Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those.” At first glance I found information on a Homeland Security detention facility being build in nearby Tacoma, WA.  After skimming through those supposedly classified documents I went on to read about nuclear fission reactors in China, DOD spy training and Julian Assange.  I’m sure many of you find […]

    Before Wikileaks there was Cryptome

    ORIGINALLY POSTED 4 FEBRUARY 2011 Today I stumbled upon a website I haven’t visited in years.  Since 1996, Cryptome.org has functioned as a repository for information about freedom of speech, cryptography, spying, and surveillance. According to the site: “Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those.” At first glance I found information on a Homeland Security detention facility being build in nearby Tacoma, WA.  After skimming through those supposedly classified documents I went on to read about nuclear fission reactors in China, DOD spy training and Julian Assange.  I’m sure many of you find […]

    Continue Reading...