The latest in a string of high-profile hacks, the office of the Australian Prime Minister has reported that several thousand emails have been breached since February. …Read More →
A new form of malware has been spreading across company servers with promises of sexual enlightenment in a PowerPoint. The file, “Real kamasutra.pps.exe,” has lured countless pleasure-seekers with an illustrated guide to some of the ancient text’s most popular positions.
Once downloaded, however, the PowerPoint’s viewer inadvertently invites a trojan horse (not a sexual position) virus which gives the hacker backdoor access to the infected computer. With this access the hackers can steal sensitive information and use it to their advantage.
This tactic of playing on an unwitting victim’s sexual curiosity is about as old as the Kama Sutra itself. So remember, if you receive an email promising any kind of erotic benefit, you’re most likely getting screwed.Read More →
We all know that hacking into other people’s e-mail accounts is wrong; especially if you are planning on committing a crime like fraud or stealing personal details with the intention of blackmail. But what if you looked into your family member’s e-mail account, only because you were fearing for the safety of your own child?—from your own home computer. Should it be punishable on the same level of crime as identity fraud or stealing millions of dollars from giant corporations?
For Leon Walker, a Michigan man that looked into his wife’s e-mail address, it might just be. Walker was charged with unauthorized access to a computer in order to “acquire, alter, damage, delete or destroy property,” and will be going to trial on Feb. 7th. If found guilty he might face up to 5 years in prison.
But how exactly did Walker “hack” into his buy cialis wife’s e-mail account, and why?
It wasn’t by using any technical or complex hacking process or tool. Instead, he used their home computer, which he had paid for, and looked up his wife’s e-mail password in an address book that she keept right next to the computer. And what he found he was rightly suspicious about.
His wife was having an affair with her second ex-husband, who had previously been arrested for beating her in front of her son. Finding this out, Walker not only had kamagra kapsuli reason to confront her, but he also brought up the e-mail in their divorce and child custody battle, which is when she reported him to the police.
But should Walker be found guilty of this crime? And should it even be considered a crime in a domestic case where the clomid success stories twins man was fearing for the safety of his own children? Widener University law professor Michael Dimino says even though generally these laws are applied to identity theft cases or stealing trade secrets, people could be rightfully prosecuted under these statutes if their interest is just curiosity.
We will find out on Feb 7th what the judges decide, but until then what do you think? Is it right to snoop on your significant other’s e-mail, or should it be a crime?Read More →
As we stumble headlong into the next generation of Web-enabled gadgets, oftentimes we look at what’s “cool” and what’s “innovative” moreso than what’s “secure.” This see-no-evil mentality has encouraged lackadaisical programmers to cut corners in the development of HDTVs, smartphones, and countless other products, which has, in turn, given rise to new avenues for hackers and scam artists. …Read More →
Clicking on links from unreliable sources is like taking candy from strangers – you just don’t do it! Sure, some of these links might lead to safe and family friendly websites, but most seasoned Twitter users know that a lot of links can be very dangerous. But with Twitter’s latest security flaw, even the most security conscious users can be tricked into downloading malware. …Read More →
David Irving, a controversial British historian and accused holocaust denier, has recently been hacked by a group called the “anti-fascist hackers.” These hackers got into Irving’s private e-mail account and posted most of his private information, including e-mails, tour dates, and even account information of supporters on the WikiLeaks website. …Read More →