Hacking

44 articles
Avatar_57x57

Kim Dotcom: From Playboy Entrepreneur to Political Firebrand

A profile of the Megaupload founder, who has started a political party in New Zealand as the U.S. continues to fight for his extradition.

Avatar_57x57

Every Thought, Every Motion

An Antarctic data hack.

"Still inside the joy, he moved quickly and quietly through the cold, barren corridor, past a row of humming, refrigerated steel doors labeled 'BSL-4 Biohazard,' into the sterile, white labs. Four five-thousand-liter liquid nitrogen tanks were lined up against the wall, the tubes that fed them thick with insulation against the extreme chill of the coolant. The third vat was open and breathing ice crystals into the air. He was glad he had loaded out with a virus filter in the mask. The power was still on, so the tank might freeze again. He pushed the lid shut, holding his breath just in case."

Avatar_57x57

Mother Earth Mother Board

A 42,000-word, 3-continent spanning “hacker tourist” account of the laying of the (then) longest wire on earth.

Avatar_57x57

The Zombie Hunters

Tracking cyberextortionists and their roving swarms of bots.

Avatar_57x57

The Internet's Best Terrible Person Goes to Jail

A master troll on trial in New Jersey.

Avatar_57x57

Cosmo, the Hacker 'God' Who Fell to Earth

A 15-year-old hacker and his tricks.

Avatar_57x57

Cyborg America: inside the strange new world of basement body hackers

“For the first few days after the surgery, it was difficult to separate out my newly implanted sense from the bits of pain and sensation created by the trauma of having the magnet jammed in my finger.”

Avatar_57x57

How Apple and Amazon Security Flaws Led to My Epic Hacking

A tech reporter tells the story of his ruined digital life.

Avatar_57x57
Avatar_57x57

“Hello, I Am Sabu ...”

A profile of Hector Xavier Monsegur, aka Sabu, a hacker star of Anonymous and resident of a New York City housing project.

Avatar_57x57

Scripting on the Lido Deck

On board the Perl Whirl 2000, a conference of hard-coding geeks on a luxury cruise ship.

Avatar_57x57

The Man Who Hacked Hollywood

How a lonely, self-taught hacker found his way into the private emails of movie stars – and into the underworld of the celebrity-skin business.

Avatar_57x57

The Hacker Is Watching

In a dark echo of Rear Window, a wheelchair-bound hacker seizes control of hundreds of webcams, most of them aimed at young women’s beds.

Avatar_57x57

The Pest Who Shames Companies Into Fixing Security Flaws

A profile of Christopher Soghoian whose “productions follow a similar pattern, a series of orchestrated events that lead to the public shaming of a large entity—Google, Facebook, the federal government—over transgressions that the 30-year-old technologist sees as unacceptable violations of privacy.”

Avatar_57x57

How Two Scammers Built an Empire Hawking Sketchy Software

On Sam Jain and Daniel Sundin, the fugitive kings of scareware.

Avatar_57x57

The Autistic Hacker

As part of his obsessive search for evidence of UFOs, Gary McKinnon worked his way into thousands of government computers. The U.S. charged him with terrorism. Doctors diagnosed him with Asperger’s. And his lawyers started arguing a new version of the insanity defense.

Avatar_57x57

Shaqzilla!

On the battle between Shaquille O’Neal and his former IT guy, who’s in control of much of O’Neal’s archived (and often damning) correspondence.

Avatar_57x57

Porn, Piracy, & BitTorrent

In the first seven months of 2011, 94,000 people were sued for illegally downloading porn. Not one case has been decided by a jury. On the industry’s new strategy to make downloaders pay.

Avatar_57x57

Enter the Cyber-Dragon

On a decade-long war:

Hackers from many countries have been exfiltrating—that is, stealing—intellectual property from American corporations and the U.S. government on a massive scale, and Chinese hackers are among the main culprits.

Avatar_57x57

Cyber Weapons: The New Arms Race

Around the world, governments and corporations are in a race for code that can protect, spy, and destroy—hacks some secretive startups are more than happy to sell.

Avatar_57x57

How One Man Hacked His Way Into the Slot-Machine Industry

The story of a small Latvian counterfeiting business that got far too big for its own good.

Avatar_57x57

The Chilling Story of Genius in a Land of Chronic Unemployment

On the ground in Nigeria with the nation’s notorious scam artists, who share a remarkable number of qualities with America’s top entrepreneurs.

Avatar_57x57

The Trial of Mary Bale

Last summer, when she thought nobody was looking, Mary Bale put a cat in the trash. The act was caught on video, and Bale was quickly tried and convicted online. The aftermath of a viral crime.

Avatar_57x57

How Barrett Brown Helped Overthrow Tunisia's Government

The closest thing that the international network of hackers Anonymous has to an organizer lives in a 378 sq. ft apartment in Dallas and, at the time of this interview, was on his fourth day of opiate withdrawal.

Avatar_57x57

Anatomy of a Crushing

A technical, thrilling account of how Pinboard, a tiny bookmarking service, dealt with the fire hose of new users after news leaked that Yahoo would discontinue Pinboard’s massive rival, Delicious.

Avatar_57x57

4Chan's Chaos Theory

“If 4chan sounds trivial, that’s because it is. The site certainly doesn’t make much money…In fact, you could say that 4chan has cornered the market on the trivial on the Internet, which is no small feat (the trivial usually spreads by accident on the Web, according to no logic).”

Avatar_57x57

A Declaration of Cyber-War

“While its source remains something of a mystery, Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating.”

Avatar_57x57

A Remote Town in Romania Becomes Cybercrime Central

A trip to Râmnicu Vâlcea, a town of 120,000 where the primary (and lucrative) industry is Internet scams.

Avatar_57x57

Cracking the Scratch Lottery Code

“I’m not the kind of guy who hears voices. But that night, as I passed the station, I heard a little voice coming from the back of my head…‘If you do it that way, if you use that algorithm, there will be a flaw. The game will be flawed. You will be able to crack the ticket. You will be able to plunder the lottery.’”

Avatar_57x57

From Russia With LØpht

How a legally dubious FBI sting lured a pair of Russian hackers stateside.

Avatar_57x57

The Man Who Spilled the Secrets

The backstory on Julian Assange’s relationship with the Guardian and the New York Times.

Avatar_57x57

The Viral Me

A tech neophyte looks for answers in Silicon Valley, “the last place in America where people are this optimistic.”

Avatar_57x57

Teen Mathletes Do Battle at Algorithm Olympics

Inside the world of competitive coding.

Avatar_57x57

The Men Who Stole the World

What happened to the minds behind Napster, Gnutella, WinAmp, and BitTorrent after their creations irrevocably changed business and culture.

Avatar_57x57

The Great Cyberheist

The prosecutor in the case of hacker turned F.B.I. informant (but still hacker) Albert Gonzales and his organization Shadowcrew : “The sheer extent of the human victimization caused by Gonzalez and his organization is unparalleled.”

Avatar_57x57

Lost in Space

How two Italian teenagers hacked the Soviet space program and may have heard the dying breaths of a lost cosmonaut.

Avatar_57x57

The Online Threat

Are we at war? The U.S. government’s evolving response to cyber security and its impact on privacy.

Avatar_57x57
Avatar_57x57

Secrets of the Little Blue Box

How phone phreakers, many of them blind, opened up Ma Bell to unlimited free international calling using a technical manual and a toy organ.

Avatar_57x57

alt.scientology.war

An early 1995 peek at what happens when secretive groups meet the Internet: a Scientology Usenet group, populated by believers and critics, stirs conflict that results in raids.

Avatar_57x57

No Secrets

A profile of WikiLeaks’ Julian Assange.

Avatar_57x57

Jihad 2.0

In the wake of 9/11, terrorist networks moved their recruitment and training efforts online, giving birth to Jihad-geeks like Irhabi_007.

Avatar_57x57

The biggest identity theft case ever

A teenage Florida hacker crew, millions of credit cards numbers stolen by driving by big box stores and entering their networks, $1.1 million in cash buried in a backyard, an FBI snitch,  and how it all fell apart.

Avatar_57x57

The Enemy Within

The Conficker ‘worm’ has replicated itself across tens of millions of computers. Only a few hundred people have the knowledge to recreate how, and no one (except its anonymous maker) fully understands why.