Archive of ‘cracker’ category

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
http://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/

hack the drones

Hackers are able to seize control of consumer drones and make them fall from the sky

https://plus.google.com/+ScrewMuggz/posts/KMtnAxhMYtc

there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.

Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.

My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones

+++++++++++++++++
more on drones in this IMS blog:
http://blog.stcloudstate.edu/ims?s=drones

hackers versus crackers: Guccifer

Hackers versus crackers

http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/

http://www.pctools.com/security-news/crackers-and-hackers/

Federal court sentences original Guccifer

By Mark Rockwell Sep 02, 2016

https://fcw.com/articles/2016/09/02/guccifer-sentence-rockwell.aspx

+++++++++++++++++

more in this blog on hackers and crackers

http://blog.stcloudstate.edu/ims?s=hackers

http://blog.stcloudstate.edu/ims?s=crackers

 

your social media account cracked

This is what happens when someone hacks your Spotify account

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”

The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers’ success.

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords