One of the first articles about #ransomware in the sense we think about it now, drive by exploitation of Internet Explorer leading to infection by 'pgpcoder', $200 ransom payable via bank transfer, contact with the people behind the attacks via yahoo! email. We've come a long way since. #hacking#hacker#history
So I have a presentation tonight, and thought I would promote BornHack a bit @bornhack
It is a very nice, cozy, HYGGE camp in Denmark July 17-24. You should consider it if you need a break from the outside world.
I looked these pictures I took of my camp, and associated KEA tent from last year. It sums up the camp for me, sleeping tent, working tent, serious tent and when the night falls, music and lights
As #ICQ is shut down in a few days I think I can disclose this now:
Long long time ago, the official ICQ client allowed #flash avatars. It was possible to use custom flash avatars (from a webserver controlled by me) by uploading a special XML file pointing to that URL using the Miranda (?) ICQ plugin.
The flash avatars allowed #ActionScript and the flash player was running as local user. The intended use case was animated avatars (I send a smiley and the avatar smiles).
I crafted a flash file that displayed a static picture (so nobody will notice its a flash avatar), but opened a http connection to my server and waited for commands. I just used this to run "play this mp3 from that URL" and prank people and never used it for something evil. Never tried to figure out what was possible in terms of local access etc. and never disclosed this possibility until now.
Fascinated by this story that got a lot of attention in July of 2003.
"The government and private technology experts warned Wednesday that hackers plan to attack thousands of Web sites Sunday in a loosely coordinated "contest" that could disrupt Internet traffic." #hacker#hacking#history
A hacker group has claimed responsibility for a cyberattack that targeted auction house Christie’s earlier this month.
The attack took place just before the start of its high-profile spring sales event involving more than $850 million worth of art. Online bidding was suspended, but the group claims it has accessed sensitive information about wealthy art collectors around the world, and is threatening to release it unless “an agreement” is reached. Digital Trends has more.
Please RT for reach: I’m trying to #FOIA records on computer intrusions into DOD systems during first Gulf War (1990), I have a GAO report which gives a high level summary but am looking for more.
Does anyone know what DOD department might have investigated #hacking back then?
@liaizon no problem! I am always on the lookout for stories relating to female hackers and phone phreaks as their stories are seriously under-represented in any of the mainstream hacker history timelines.
Stumbled across this 1984 episode of the comedy series Night Court called "The Computer Kid" about a precocious boy who winds up in trouble for #hacking his school and I love it.
#Hacking violence et coup de pression, qui a tenté d’empêcher la diffusion ?
La #Chine fait elle la police en #France ?
Hacking violence et coup de pression, qui a tenté d’empêcher la diffusion ?
Alerté en amont, Envoyé Spécial a pu suivre et filmer une opération clandestine de la #police#chinoise à #Paris. Une #histoire à peine croyable racontée dans un #reportage exceptionnel qui dérange la Chine.
"A computer virus is the product of a creative mind- a different type of creativity than Japan usually produces," said Yuichi Murano, an
executive of Nihon Sun Microsystems.
"Those are the kinds of talents we need more of." Nihon Sun is the Japanese subsidiary of a Silicon Valley company, Sun Microsystems, whose machines are both the favorite tools and the favorite targets of many hackers.
Been reading about the case of Edward Austin Singh in the UK, a #hacker who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various #hacked computers, by UK police in 1988. #hacking#history
Apparently the US Secret Service had become aware of Singh's hacking activities that touched on US government, military and corporate systems and there was some attempt to lure him to the US for arrest before the UK authorities eventually stepped in.
@realhackhistory I used to hang out with Edward quite a lot for a couple of years. Nearly went into business with him after we developed some secure file transfer software. After the Surrey stuff he did a nice "prank" hack on a video store chain.
Last I heard about him were rumours he was working for microsoft. never verified
There is a great book about him called "Beating the System" by Owen Bowcott
"In October, a computer hacker revealed how he entered the Belgian government's computer system and for several months read the electronic mail of about 10 Cabinet ministers, including Prime Minister Wilfried Martens.
The hacker said he even met other "burglars" in the system, which had confidential information such as details on terrorist killings and the agenda of weekly Cabinet meetings."
The story of the first person convicted of planting a destructive computer virus, Donald Gene Burleson, from the March 1989 issue of Texas Monthly. This is a great write up of the story behind an incident that had taken place in 1985 and the resulting court case. #hacking#history https://www.texasmonthly.com/true-crime/search-and-destroy/
Still combing through #hacker stories in news archives from 1987 & what the hell is this.
As reported in The Albany Herald in April of 1987, this cop had his #hacking conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.
Olson, according to the investigating officers, admitted his uses of the computer "were not part of any official inquiry. but were solely for his own use for some sort of collection he called his 'Rogues' Gallery'"