Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Hackers: Experts and Sources
Sources Directory - Subject Index


News Releases

Enraged hacker resorts to aggressive methods against French journalist and website
2014-08-07
Reporters Without Borders
Gregory Chelli, a French hacker living in the Israeli city of Ashdod, has been using extraordinarily aggressive methods to harass Benoit le Corre, a journalist with the French news website Rue89

Sources Select Resources

Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg
Janjevic, Darko
Article
2015
DW
Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software...
Documents Reveal Canada's Secret Hacking Tactics
Gallagher, Ryan
Article
2015
The Intercept
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Extraordinary Violence at 500 Pearl Street
The Sentencing of Jeremy Hammond
Tarrant, Anthony
Article
2013
Dissident Voice
On Friday, November 15, 2013, extreme violence with malicious intent was meted out by Federal District Court Judge Loretta Preska in the sentencing phase of 28 year old hacktivist Jeremy Hammond befor...
Hacktivist Jeremy Hammond Sentenced to 10 Years
His Idealism Remains at Large
Hayase, Nozomi
Article
2013
Dissident Voice
28-year-old political activist Jeremy Hammond was sentenced to 10 years in prison and three years of supervised release at the Federal District Court for the Southern District of New York. This was th...
Internet Hackers and the Real Threat They Expose
Government and Corporations are the Real Problem
Lopez, Alfredo
Article
2013
Counter Punch
There were nearly ten major cyber attacks in August 2013 against very prominent targets such as The New York Times.
'Can you hear me?': New phone scam tricks you into answering 'yes'
Snowdon, Wallis
Article
2017
CBC News
Describes a new telephone scam being run in North America, wherein a recording of one's voice saying the word 'yes' is used to defraud victims.
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
Fishman, Andrew; Marquis-Boire, Morgan
Article
2015
The Intercept
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n...
Spelling mistake prevented hackers taking $1bn in bank heist
Reuters
Article
2016
The Guardian
New York Fed reveals spelling of 'foundation' as 'fandation' prompted bank to seek clarification and stop transfer, but hackers still got away with about $80m.
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
Article
2015
The Intercept
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
Stuxnet on the Loose
Security for the One Percent
Blunden, Bill
Article
2012
CounterPunch
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
Think the Left Won the Culture War? Think Again
deBoer, Fredrik
Article
2015
Observer
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Article
2012
The Guardian
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Watch your attachments: Microsoft Office bug lets hackers take over computers
Article
2014
RT
A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr...

Sources Bookshelf

Dark Market
Cybethieves, Cybercops and You
Glenny, Misha
Book
2011
Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2016. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.