|
|
Welcome to
Profound States
-
brought to you by
Positive Change Hypnosis of Atlanta, Georgia. |
|
Hacking
|
Major Pages,
Tools, Articles & Docs, History,
Competitions, Featured Books and
The Phone Masters
|
Featured Articles
|
How a trivial cell phone hack is ruining lives
(6/28/2019)
Chatting in Secret While We're
All Being Watched
(7/14/2015)
The Untold Story of NotPetya, the Most
Devastating Cyberattack in History
|
The Hacking of The
Hacking Team Gives a Unique
Insight Into The Proliferation
of Hacking Tools Used by
Repressive Governments
|
Hacking Team Emails Expose
Proposed Death Squad Deal,
Secret U.K. Sales Push and Much
More (The Intercept: 7/8/2015)
Hacking Team Leaks Reveal
Spyware Industry's Growth,
Negligence of Human Rights
(Electronic Frontier Foundation:
7/8/2015)
A Detailed Look At Hacking
Team's Emails About Its
Repressive Clients (The
Intercept: 7/7/2015)
Why
Did the Firm That Sold Spyware
to the UAE Win a Special Export
License From State Department?
(The Intercept: 7/7/2015)
Mexico Is Hacking Team’s Biggest
Paying Client — By Far
(Vice News: 7/7/2015)
Mapping Hacking Team’s
“Untraceable” Spyware
(2/17/2014)
Hacking Team and the Targeting
of Ethiopian Journalists
(2/12/2014)
Hacking Team’s US Nexus
(2/28/2014)
You
Only Click Twice: FinFisher’s
Global Proliferation
(3/13/2013)
ENEMIES OF THE INTERNET: 2013
REPORT: SPECIAL EDITION:
SURVEILLANCE
(Reporters Without Borders:
2/3/13) - as the most in depth
article, of those shown here,
this report gives an in depth
analysis of the many repressive
regimes using malware to repress
their people.
|
Other
News
|
How cybercriminals hold data
hostage... and why the best
solution is often paying a
ransom: Targets have included
hospitals and municipalities,
but the FBI says anyone on the
internet should expect to be
attacked by cybercriminals
(5/05/2019)
'Shadow Brokers' Claim To Have Hacked The NSA's Hackers
(NPR 8/17/2016)
A Cyberattack Finally Has Hit A Major Power Grid, And It Did
Exactly What We Feared (1/6/2016)
ENEMIES OF THE INTERNET: 2013 REPORT:
SPECIAL EDITION: SURVEILLANCE gives an in
depth analysis of the many repressive regimes using malware
to repress their people.
The Untold Story of NotPetya,
the Most Devastating Cyberattack
in History (8/22/2018)
AP Exclusive: Google tracks your
movements, like it or not
Hackers Expose Scary Amazon Echo
Vulnerability: Security
researchers have discovered a
way to turn an Amazon Echo into
a spy bug.
FBI paid 'gray hat' hackers to
defeat iPhone security in San
Bernardino terrorism case
(4/13/2016)
Charges Announced in J.P. Morgan Hacking Case
(11/10/2015)
IRS: Computer Breach Bigger Than
First Thought; 334K Victims
(8/17/2015)
If
you use Firefox, you should update right away (Fortune:
8/7/2015)
What federal employees really
need to worry about after the
Chinese hack (7/29/2015)
After Jeep Hack, Chrysler
Recalls 1.4M Vehicles For Bug
Fix (7/24/15)
Hacks on the highway: Automakers
rush to add wireless features,
leaving our cars open to hackers
FBI and DOJ Target new Enemy In Crypto
Wars: Apple and Google
(7/8/2015)
No, North Korea Didn’t Hack Sony
(12/24/2014)
Hackers With Apparent Investment
Banking Background Target Biotech
(12/02/2014)
ShareFacebookTwitter.Security
firms uncover 'sophisticated'
Regin spyware
(11/24/2014)
World’s most advanced hacking
spyware let loose
(11/23/2014)
Microsoft fixes '19-year-old'
bug with emergency patch
Federal workers, contractors
reportedly behind many cyber breaches --
often by accident
(11/10/2014)
Cyberespionage group targets
traveling execs through hotel networks
Huge raid to shut
down 400-plus dark net sites
Heartbleed (wiki)
is considered the worst internet
security breach ever.
On Tuesday November 16, British hacker
Gary McKinnon finally won his decade
long battle to avoid extradition to the
US to face charges of hacking into the
computer systems of NASA, the Pentagon
and other government agencies.
(12/6/13)
Target Admits Massive Credit Card
Breach; 40 Million Affected
Cryptolocker Ransomware Being
Described As ‘The Perfect Crime’
Expert: Hackers from Russia hit
Illinois water system
Science fiction-style sabotage a fear in
new hacks: Attacks capable of disrupting
national infrastructure are cheaper,
easier and faster (10/23/11: MSNBC)
Science fiction-style sabotage a fear in
new hacks: Attacks capable of disrupting
national infrastructure are cheaper,
easier and faster (10/23/11: MSNBC)
U.S. & Israel Launch New Phase Of Cyber
Warfare: Second version of Stuxnet virus
is virtually identical to first
incarnation (10/20/11)
SECRETS AND SOFTWARE: How a
Pentagon program and a hacker assisted a
revolution
-
Tor
(related software)
Hacker Rattles Internet Security Circles
- (9/12/11: NYTimes)
Anonymous Hackers Targeted By FBI,
Homeland Security For Potential National
Security Threat (9/11/11)
Computer hackers can force cars to
unlock doors, start engines
(8/19/11)
What Could Possibly Go Wrong: Industrial
Cyber-Sabotage: Stuxnet gives hackers a
blueprint for sophisticated new malware
(2/4/11)
Low-threat worm caused 'most significant
breach' of U.S. military net
(8/26/10)
Art of the Steal: On the Trail of
World’s Most Ingenious Thief
(3/22/10)
Google's internal spy system was Chinese
hacker target (1/13/10)
Insurgents Hack U.S. Drones: $26
Software Is Used to Breach Key Weapons
in Iraq; Iranian Backing Suspected
(12/18/09)
U.S., Russia open talks on limits to
cyberwar
(12/12/09)
New cloud-based hacking service can
crack Wi-Fi passwords in 20 minutes
(12/8/09)
Noisebridge hacker collective
(photos)
Researchers break into BitLocker
60 Minutes: We're not ready for a cyber
war (11/9/09)
Photos:
Random Hack of Kindness
Hijacking Windows System Restore for
cybercrime profits (9/23/09)
Modern banker malware undermines
two-factor authentication (9/23/09)
FBI's 'Operation Phish Phry' snares
nearly 100 people (10/7/09)
Russkie Civvies Waging Cyberwar
(8/21/09)
The Ultimate Lock Picker Hacks Pentagon,
Beats Corporate Security for Fun and
Profit (5/22/09)
Hackers reportedly have embedded code in
power grid (4/8/09)
Obama's Intelligence Adviser Involved in
Security Breach (1/12/09)
Catch Me If You Can.pdf (1/09: Wired
Magazine)
Kyrgyzstan under cyber attack
Google Video search results poisoned to
serve malware (1/27/09)
IT expert executed in Iran (12/1/08)
Indictments in huge hacking & theft case
(8/5/08)
Blackhat Europe, Day 1: The Waag, the
Bulldog, and web application hacking
(3/25/08)
Zone-H web defacement data shows
platforms don’t matter (3/17/08)
Hackers At Harvard! University Admits
Security Breach (3/14/08)
-
CIA: Cyberattack caused multiple-city
blackout (1/22/08)
-
Hackers attacking US utilities overseas
(1/20/08)
-
CIA reveals that hackers were
responsible for power outages
(1/18/08)
Is there a rootkit stashed in your boot
record? (1/9/08)
Trojan attacks bank accounts, automates
wire transfers (12/18/07)
Cracking open the cybercrime economy
(12/14/07)
Linkin Park's Mysterious Cyber-stalker
(5/15/07: Wired Magazine)
Cyber-crooks exploiting new Windows DNS
flaw (4/12/07)
Microsoft makes copying Vista a monster
task (3/30/07)
Microsoft confirms Windows zero-day,
drive-by exploits (3/29/07)
Russian (Gozi) Trojan powering massive
ID-theft ring (3/21/07)
AOL phisher faces up to 101 years in
prison. (1/16/07)
Microsoft makes Windows more secure but
it may not matter (12/17/06)
Microsoft engaging with hackers, seeking
the help of those who besiege Windows at
the world's largest hacker conference.
(10/6/06)
Chinese computer hackers target US
Commerce Department. (10/6/06)
Hackers building 'botnet' with AOL instant messaging worm...
(9/20/06)
Hackers building 'botnet' with AOL instant messaging worm...
(9/20/06)
Point and Click DDoS Attacks (7/21/06: The Washington Post)
MySpace Attacked by Flash Worm (7/17/06: The Washington Post)
Five Arrested in Theft Of LexisNexis Data (7/1/06: The Washington
Post)
Nuclear agency computers
hacked: Stolen file contained unclassified information on 1,500 contract
workers (6/9/06: MSNBC)
Circuit City Closes Web Security Hole (Washington Post: 6/2/06)
Personal Data on Veterans Is Stolen: Burglary Leaves Millions at Risk Of
Identity Theft (5/23/06: Washington Post)
Building A Botnet
Invasion of the Computer Snatchers (22/19/06: Washington Post)
NASA Hacker Breaks Silence: 'There's An E-T Conspiracy Going On'
World's biggest hacker held (6/8/05)
Hacker
Hunters - An elite force takes on the dark side of computing
(5/30/05: Business Week)
Hack most
wireless LANs in minutes! (3/11/05)
Hackers
breach LexisNexis, grab info on 32,000 people (03/09/05)
Melita Norwood: A
secret life (9/12/99)
Microsoft Security Flaws Renew Calls For Alternative Web Browsers
(7//3/04)
Black Demon targets computer hackers (4/28/04)
Hacking and Internet Crimes
Govt. Explains How It Caught "Blaster" Author
Hackers
break into database at UT-Austin (3/6/02)
China Prevented
Repeat Cyber Attack On US
by Pamela Hess UPI Pentagon (10/29/02)
Cable ISPs
join war on file-sharing
Attack
cripples key Internet computers
"A
University of Tulsa professor has been granted nearly $1 million to do
groundbreaking research on the dangers cyberterrorism poses to the
nation's telephone networks."
Without XPdite, or XP's
Service Pack 1,
clicking on a simple, but malicious, URL can
delete the entire contents of your directories.
Cybernarks - Who's hunting the Hackers?
New hacker tool could target Web servers
From
Code Red to Code Dread
Parasitic Computing
Researchers
Pull Hacker Report After Lawsuit Threat
Is China's Guandong province ground zero for hackers?
Password Thief Ransacks
AOL
by Chris Oakes
'Love-bug'
virus result of gang war, say hackers
hactivism.org
cult of the dead cow
on Friday, a government
source told MSNBC that the nation's most sensitive
nuclear weapons research facility was the victim of
crackers
Kashmir-minded Pakistani
'hacktivists' blitz Web sites |
|
|
|
|
|