Tagged: Hackers

Computer Hacking Rules (as learned from the movies)

Source: io9 1. One of the hackers must take over every channel on TV and deliver a speech that’s like a bad ripoff of a Max Headroom routine. They should scoff at the government, and use the word “sheeple.” Either that, or the hacker should have an underground viral video show that involves crazy stunts and hip hop music. 2. At some point Keanu Reeves must show up. Hopefully with a ton of data implanted in his head and a cyber-dolphin. 3. Every aspect of the plot will be better if you just append the words “virtual” or “cyber” to them. There will be “virtual terrorism” and “cyber war”. References to “e-bombs” a plus. Can you use a firewall to block the virtual terror downloads? Yes! 4. Hacking scenes will involve psychedelic user interfaces that look like something out of an early 1990s music video. Remember, hackers never use command...

Hackers threaten to release Symantec source code tomorrow

Source: CNET The hackers, who call themselves “Yama Tough” and employ the “Anonymous” mask in its Twitter avatar, said in a tweet Saturday it would release the 1.7GB source code on Tuesday, along with the message “the rest will follow…” Several reports surfaced earlier this month that hackers had managed to access the source code for certain Symantec products. Symantec identified the products as Symantec Endpoint Protection (SEP) 11.0 and Symantec Antivirus 10.2 but said the attack did not affect any current Norton consumer products. The hackers said they found the code after breaking into servers run by Indian military intelligence. The code was apparently left on there by mistake after Indian authorities inspected the sourced code to ensure it was secure, which is where the hackers found the code. The group said in a Pastebin post that it had the “source codes of dozens of companies” and contained documentation...