Enraged hacker resorts to aggressive methods against French journalist and website
Reporters Without Borders
Gregory Chelli, a French hacker living in the Israeli city of Ashdod, has been using extraordinarily aggressive methods to harass Benoit le Corre, a journalist with the French news website Rue89
Sources Select Resources
Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg
Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software...
CIA sneak undetectable 'malicious' implants onto Windows OS - WikiLeaks
Windows machines are targeted by the CIA under 'Angelfire,' according to the latest release from WikiLeaks' 'Vault7' series. The documents detail an implant that can allow Windows machines to create u...
Documents Reveal Canada's Secret Hacking Tactics
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Extraordinary Violence at 500 Pearl Street
The Sentencing of Jeremy Hammond
On Friday, November 15, 2013, extreme violence with malicious intent was meted out by Federal District Court Judge Loretta Preska in the sentencing phase of 28 year old hacktivist Jeremy Hammond befor...
Hacktivist Jeremy Hammond Sentenced to 10 Years
His Idealism Remains at Large
28-year-old political activist Jeremy Hammond was sentenced to 10 years in prison and three years of supervised release at the Federal District Court for the Southern District of New York. This was th...
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
Internet Hackers and the Real Threat They Expose
Government and Corporations are the Real Problem
There were nearly ten major cyber attacks in August 2013 against very prominent targets such as The New York Times.
Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders
Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the centre of a massive Facebook-data scandal.
The Motherboard Guide to Not Getting Hacked
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb...
'Can you hear me?': New phone scam tricks you into answering 'yes'
Describes a new telephone scam being run in North America, wherein a recording of one's voice saying the word 'yes' is used to defraud victims.
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
Fishman, Andrew; Marquis-Boire, Morgan
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n...
Science's pirate queen
Alexandra Elbakyan is plundering the academic publishing establishment
A profile of open access academic publishing activist Alexandra Elbakayan and the ongoing conflict between academics and for-profit academic publishing houses.
Spelling mistake prevented hackers taking $1bn in bank heist
New York Fed reveals spelling of 'foundation' as 'fandation' prompted bank to seek clarification and stop transfer, but hackers still got away with about $80m.
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
Stuxnet on the Loose
Security for the One Percent
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
Electronic Fronteri Foundation
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Think the Left Won the Culture War? Think Again
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Watch your attachments: Microsoft Office bug lets hackers take over computers
A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr...
Cybethieves, Cybercops and You
Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...
Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2018. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.