Home Title Index Topic Index Sources Directory News Releases Sources Calendar

Hackers
AlterLinks Topic Index

  1. Approaching Zero
    Resource Type: Book
    Published: 1993
  2. Brandon University
    Media Profile in Sources

    Resource Type: Organization
  3. Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg
    Resource Type: Article
    Published: 2015
    Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software.
  4. CIA sneak undetectable 'malicious' implants onto Windows OS - WikiLeaks
    Resource Type: Article
    Published: 2017
    Windows machines are targeted by the CIA under 'Angelfire,' according to the latest release from WikiLeaks' 'Vault7' series. The documents detail an implant that can allow Windows machines to create undetectable libraries.
  5. Dark Market
    Cybethieves, Cybercops and You

    Resource Type: Book
    Published: 2011
    Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these crimes which are undertaken across so many jurisdictions the thieves are virtually impossible to prosecute.
  6. Documents Reveal Canada's Secret Hacking Tactics
    Resource Type: Article
    Published: 2015
    Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.
  7. Enraged hacker resorts to aggressive methods against French journalist and website
    Sources News Release

    Resource Type: Article
    Published: 2014
    Gregory Chelli, a French hacker living in the Israeli city of Ashdod, has been using extraordinarily aggressive methods to harass Benoit le Corre, a journalist with the French news website Rue89
  8. Extraordinary Violence at 500 Pearl Street
    The Sentencing of Jeremy Hammond

    Resource Type: Article
    Published: 2013
    On Friday, November 15, 2013, extreme violence with malicious intent was meted out by Federal District Court Judge Loretta Preska in the sentencing phase of 28 year old hacktivist Jeremy Hammond before a chamber packed with friends, family, supporters and others.
  9. Hacktivist Jeremy Hammond Sentenced to 10 Years
    His Idealism Remains at Large

    Resource Type: Article
    Published: 2013
    28-year-old political activist Jeremy Hammond was sentenced to 10 years in prison and three years of supervised release at the Federal District Court for the Southern District of New York. This was the maximum sentence he could receive after his non-cooperating plea deal.
  10. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  11. Internet Hackers and the Real Threat They Expose
    Government and Corporations are the Real Problem

    Resource Type: Article
    Published: 2013
    There were nearly ten major cyber attacks in August 2013 against very prominent targets such as The New York Times.
  12. Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders
    Resource Type: Article
    Published: 2018
    Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the centre of a massive Facebook-data scandal.
  13. The Motherboard Guide to Not Getting Hacked
    Resource Type: Article
    Published: 2017
    Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces some of our old guides. This guide is also available as a printable PDF.
  14. 'Can you hear me?': New phone scam tricks you into answering 'yes'
    Resource Type: Article
    Published: 2017
    Describes a new telephone scam being run in North America, wherein a recording of one's voice saying the word 'yes' is used to defraud victims.
  15. Popular Security Software Came Under Relentless NSA and GCHQ Attacks
    Resource Type: Article
    Published: 2015
    The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.
  16. Privacy For Sale
    How Computerization Has Made Everyone's Private Life an Open Secret

    Resource Type: Book
    Published: 1992
  17. The Russian Hack That Wasn't
    Resource Type: Article
    Published: 2017
    Glenn Greenwald of The Intercept exposes the fake news put out by the US Department of Homeland Security (an euphemistic name for a Big Brother operation that spies on US citizens) that Russia hacked 21 US state elections, news that was instantly spread around the world by the presstitute media.
  18. Science's pirate queen
    Alexandra Elbakyan is plundering the academic publishing establishment

    Resource Type: Article
    Published: 2018
    A profile of open access academic publishing activist Alexandra Elbakayan and the ongoing conflict between academics and for-profit academic publishing houses.
  19. Spelling mistake prevented hackers taking $1bn in bank heist
    Resource Type: Article
    Published: 2016
    New York Fed reveals spelling of 'foundation' as 'fandation' prompted bank to seek clarification and stop transfer, but hackers still got away with about $80m.
  20. Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
    Resource Type: Article
    Published: 2015
    British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as "reverse engineering," since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.
  21. Stuxnet on the Loose
    Security for the One Percent

    Resource Type: Article
    Published: 2012
    Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable criminal transgressions, normally causing our elected officials and military leaders to erupt in fits of righteous indignation. That is, unless the United States is doing the spying and the sabotaging.
  22. Surveillance Self-Defense
    Resource Type: Website
    Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  23. Think the Left Won the Culture War? Think Again
    Resource Type: Article
    Published: 2015
    With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
  24. US was 'key player in cyber-attacks on Iran's nuclear programme'
    Obama reported to have approved bid to target Tehran's nuclear efforts

    Resource Type: Article
    Published: 2012
    Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
  25. Wanted: A Hackers' Charter
    Resource Type: Article
  26. Watch your attachments: Microsoft Office bug lets hackers take over computers
    Resource Type: Article
    Published: 2014
    A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects programs like Word, PowerPoint, and Excel – and could allow an intruder to gain access to and control over a user's entire computer.
  27. We Are Legion
    The Story of the Hacktivists

    Resource Type: Film
    Published: 2012
    A history of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age.


AlterLinks


© 2021.