Journalist Glenn Greenwald Seeks Revenge

Journalist Glenn Greenwald is the man responsible for leaking secrets by former U.S intelligence agency contractor Edward Snowden.

Glenn was recently quoted saying  “I will be far more aggressive in my reporting from now. I am going to publish many more documents. I am going to publish things on England too. I have many documents on England’s spy system. I think they will be sorry for what they did,” Glenn apparently upset over an incident that happened to his partner David Miranda.  David was passing through London’s Heathrow airport on his way back to Brazil when he was detained and questioned for nine hours before being released without being charged for a single crime.

GlennGreenwald

“They wanted to intimidate our journalism, to show that they have power and will not remain passive but will att...

Read More

WikiLeaks Insurance?

Wikileaks

WikiLeaks recently released a few torrent links that may or may not contain dangerous information as a possible insurance policy with this tweet:
WikileaksInsurance

Due to the timing of the release it is speculated that it’s a warning directed towards the U.S government based on the upcoming sentencing of Bradley Manning.

The files that came with the “Please mirror” request are encrypted as if to say “Try us, see what happens next!”  WikiLeaks holds the key and could easily unleash it upon the world essentially opening Pandora’s box.

The contents of the files have not been divulged or even hinted at and without the encryption key nobody is going to see the contents.

There has been a lot of speculation about the contents of the files;

Battlefield simulators
/dev/urandom piped into a file
Incriminating video...

Read More

Wait, NSA Malware Phoned Home?

DonAdamsPicture

Do not be fooled, even if you have honed your skills and think you are safe, you may not be. It would seem that no matter how big and bad you become, there are always things hiding in the pond that is bigger and badder than you. It’s when you become too relaxed and complacent that you start to make the mistakes that become ravenous monsters.

A hosting provider which acted as a gateway for a TOR privacy network was brought down by the NSA and a piece of malware appears to be one of the tools they used to gather data on it’s users.

In this case the only mistake that appears to have been made was that it slipped under the radar for an inordinate amount of time...

Read More

Barnaby Jack Murdered?

Barnaby Jack

As we ramp back up here at Hackronomicon and add new and improved features and assets, we feel it is important to continue with content. Here is a decent report on the Hacker Barnaby Jack. It show-cases some of his powerful talent and asks the important question “was his death all part of some insidious plan?”

It truly is sad to have lost such an inventive and elite hacker, he will be missed.

We seek the freedom of information and truth.

Read More

Hackers Hacking the Hackable, FBI?

With all of the technology and the heightened amount of security consciousness in the world you would think that the FBI as a whole would rank at the top of the secure list of agencies, of course you would be wrong.
 
“A law enforcement agency using unencrypted, unsecure communications is a major fumble,” said Marcus Carey who apparently spent a number of years securing communications for the U.S. National Security Agency before joining security-risk assessment firm Rapid7.
 
Anonymous hackers uploaded an audio file of roughly 15-minutes that contained a recording of a phone conversation of FBI agents discussing how they were going to take down Anonymous. Anonymous then tweeted “the FBI might be curious how we’re able to continuously read their internal comms for some time now.”
 
After th...

Read More

SD Card Scam Scammed

sdcard_wrench

 
In this ever changing landscape both in the tangible world and in the virtual world, there are scams, pitfalls, rogues, thieves, spies, predators, trojans, virii, and that is just the tip of the titanic iceberg. You never know when someone is going to try to fool you into something or out of something! You may think to yourself “Nobody can fool me, I’m fool proof!” “it will never happen to me!” but now you are just fooling yourself. It is not always easy to know when you are being taken advantage of.
 
These problems come in all shapes and sizes from the massive to the minute. Take it from nekromant. He was recently a victim of on online purchase scam involving SD-CARDS. What he thought was going to be a bunch of 5 microSD cards, 4 GB. each, actually turned out to be a scam...

Read More

Anonymous – Message to the American People

 

 
 
Dear brothers and sisters. Now is the time to open your eyes!
 
In a stunning move that has civil libertarians stuttering with disbelief, the U.S. Senate has just passed a bill that effectively ends the Bill of Rights in America.
 
The National Defense Authorization Act is being called the most traitorous act ever witnessed in the Senate, and the language of the bill is cleverly designed to make you think it doesn’t apply to Americans, but toward the end of the bill, it essentially says it can apply to Americans “if we want it to.
 
Bill Summary & Status, 112th Congress (2011 — 2012) | S.1867 | Latest Title: National Defense Authorization Act for.
 
This bill, passed late last night in a 93-7 vote, declares the entire USA to be a “battleground” upon which U.S...

Read More

Microsoft’s 10 Immutable Laws of Security

Microsoft

 
These laws are all common sense. When I found them I thought I would take the opportunity to post them for those of you that are far too busy to bother yourself with such trivial concepts (you know exactly who you are!):
 
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore
 
Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore
 
Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore
 
Law #4: If you allow a bad guy to upload programs to your website, it’s not your website any more
 
Law #5: Weak passwords trump strong security
 
Law #6: A computer is only as secure as the administrator is trustworthy
 
Law #7: Encrypted data is only as se...

Read More

Say Cheese! Welcome to the Internet

Stop looking at me!

 
If you are a private person that does not care to have your mug plastered all of the world wide web then you have undoubtedly noticed that it is getting harder and harder to keep images of yourself to yourself. With the increase in small cameras being manufactured into just about every portable gadget from phones, PDA’s, and laptops, to hats, sunglasses and even stuffed animals, it’s just about impossible to remain a shadow.
 
This problem is compounded even further when there are small applications that can be installed on any platform that will quietly take pictures from webcams without your knowledge or consent. Mr. Kyle McDonald programmed an application that will patiently wait and watch like a digirati sniper until it recognizes that there is a face in the frame...

Read More

Hacking In Northern Ireland

Britain's former Northern Ireland secretary Peter Hain

 
I would just like to point out that even though the image appears to be Mr. Hain showing us the size of his penis, it simply is not the case (it clearly is an exaggeration). :)
 
Now for the news…
 
Former Northern Ireland secretary Peter Hain is caught up in an ongoing investigation where his computer may have been compromised by cyber criminals. These individuals are said to be private detectives and intelligence agents who are working under the direction of News International. On top of that Senior Northern Ireland civil servants may also have been hacked (Plot Thickens).
 
What were these individuals after you might ask?  Well his system most likely contained sensitive intelligence material of course...

Read More