Access

Cisco

Cisco certification

Database

Exchange

Fedora Core

Hacking

ICQ

IRC

JavaScript

Linux

Microsoft

.NET

NT 4.0 & Group Policy

Microsoft Office & Excel 2002

Outlook & Office

Plugins

Security

SNMP & Network Monitoring

Software

SQL

Tech Support

Unix

Viruses, Worms & Trojans

WAN Technologies Certification

Web Services

Webcasts

Webmaster

Windows NT & 95

Windows & Windows XP

Windows (2K/2K3) Server & Prof.

Windows 98, ME, Dual Boot, Winsock

Word 2002, Tools & Smart Tags

XML

Welcome to Profound States - brought to you by Positive Change Hypnosis of Atlanta, Georgia.

Hacking

Major Pages, Tools, Articles & Docs, History, Competitions, Featured Books and The Phone Masters

Featured Articles
How a trivial cell phone hack is ruining lives (6/28/2019)

Chatting in Secret While We're All Being Watched (7/14/2015)

The Untold Story of NotPetya, the Most Devastating Cyberattack in History
The Hacking of The Hacking Team Gives a Unique Insight Into The Proliferation of Hacking Tools Used by Repressive Governments

Hacking Team Emails Expose Proposed Death Squad Deal, Secret U.K. Sales Push and Much More (The Intercept: 7/8/2015)

Hacking Team Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights (Electronic Frontier Foundation: 7/8/2015)

A Detailed Look At Hacking Team's Emails About Its Repressive Clients (The Intercept: 7/7/2015)

Why Did the Firm That Sold Spyware to the UAE Win a Special Export License From State Department? (The Intercept: 7/7/2015)

Mexico Is Hacking Team’s Biggest Paying Client — By Far (Vice News: 7/7/2015)

Mapping Hacking Team’s “Untraceable” Spyware (2/17/2014)

Hacking Team and the Targeting of Ethiopian Journalists (2/12/2014)

Hacking Team’s US Nexus (2/28/2014)

You Only Click Twice: FinFisher’s Global Proliferation (3/13/2013)

ENEMIES OF THE INTERNET: 2013 REPORT: SPECIAL EDITION: SURVEILLANCE (Reporters Without Borders: 2/3/13) - as the most in depth article, of those shown here, this report gives an in depth analysis of the many repressive regimes using malware to repress their people.

Other News
How cybercriminals hold data hostage... and why the best solution is often paying a ransom: Targets have included hospitals and municipalities, but the FBI says anyone on the internet should expect to be attacked by cybercriminals (5/05/2019)

'Shadow Brokers' Claim To Have Hacked The NSA's Hackers (NPR 8/17/2016)

A Cyberattack Finally Has Hit A Major Power Grid, And It Did Exactly What We Feared (1/6/2016)

ENEMIES OF THE INTERNET: 2013 REPORT: SPECIAL EDITION: SURVEILLANCE gives an in depth analysis of the many repressive regimes using malware to repress their people.


The Untold Story of NotPetya, the Most Devastating Cyberattack in History (8/22/2018)

AP Exclusive: Google tracks your movements, like it or not

Hackers Expose Scary Amazon Echo Vulnerability: Security researchers have discovered a way to turn an Amazon Echo into a spy bug.

FBI paid 'gray hat' hackers to defeat iPhone security in San Bernardino terrorism case (4/13/2016)

Charges Announced in J.P. Morgan Hacking Case (11/10/2015)

IRS: Computer Breach Bigger Than First Thought; 334K Victims (8/17/2015)

If you use Firefox, you should update right away (Fortune: 8/7/2015)


What federal employees really need to worry about after the Chinese hack (7/29/2015)

After Jeep Hack, Chrysler Recalls 1.4M Vehicles For Bug Fix (7/24/15)

Hacks on the highway: Automakers rush to add wireless features, leaving our cars open to hackers

FBI and DOJ Target new Enemy In Crypto Wars: Apple and Google (7/8/2015)

No, North Korea Didn’t Hack Sony (12/24/2014)

Hackers With Apparent Investment Banking Background Target Biotech (12/02/2014)

ShareFacebookTwitter.Security firms uncover 'sophisticated' Regin spyware (11/24/2014)

World’s most advanced hacking spyware let loose (11/23/2014)

Microsoft fixes '19-year-old' bug with emergency patch

Federal workers, contractors reportedly behind many cyber breaches -- often by accident (11/10/2014)

Cyberespionage group targets traveling execs through hotel networks

Huge raid to shut down 400-plus dark net sites

Heartbleed (wiki) is considered the worst internet security breach ever.


On Tuesday November 16, British hacker Gary McKinnon finally won his decade long battle to avoid extradition to the US to face charges of hacking into the computer systems of NASA, the Pentagon and other government agencies. (12/6/13)

Target Admits Massive Credit Card Breach; 40 Million Affected

Cryptolocker Ransomware Being Described As ‘The Perfect Crime’

Expert: Hackers from Russia hit Illinois water system

Science fiction-style sabotage a fear in new hacks: Attacks capable of disrupting national infrastructure are cheaper, easier and faster (10/23/11: MSNBC)

Science fiction-style sabotage a fear in new hacks: Attacks capable of disrupting national infrastructure are cheaper, easier and faster (10/23/11: MSNBC)

U.S. & Israel Launch New Phase Of Cyber Warfare: Second version of Stuxnet virus is virtually identical to first incarnation (10/20/11)

SECRETS AND SOFTWARE: How a Pentagon program and a hacker assisted a revolution
-
Tor (related software)

Hacker Rattles Internet Security Circles -  (9/12/11: NYTimes)

Anonymous Hackers Targeted By FBI, Homeland Security For Potential National Security Threat (9/11/11)

Computer hackers can force cars to unlock doors, start engines (8/19/11)

What Could Possibly Go Wrong: Industrial Cyber-Sabotage: Stuxnet gives hackers a blueprint for sophisticated new malware (2/4/11)

Low-threat worm caused 'most significant breach' of U.S. military net (8/26/10)

Art of the Steal: On the Trail of World’s Most Ingenious Thief (3/22/10)

Google's internal spy system was Chinese hacker target (1/13/10)

Insurgents Hack U.S. Drones: $26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected (12/18/09)

U.S., Russia open talks on limits to cyberwar (12/12/09)


New cloud-based hacking service can crack Wi-Fi passwords in 20 minutes (12/8/09)

Noisebridge hacker collective (photos)

Researchers break into BitLocker

60 Minutes: We're not ready for a cyber war (11/9/09)

Photos: Random Hack of Kindness

Hijacking Windows System Restore for cybercrime profits (9/23/09)

Modern banker malware undermines two-factor authentication (9/23/09)

FBI's 'Operation Phish Phry' snares nearly 100 people (10/7/09)

Russkie Civvies Waging Cyberwar (8/21/09)

The Ultimate Lock Picker Hacks Pentagon, Beats Corporate Security for Fun and Profit (5/22/09)

Hackers reportedly have embedded code in power grid (4/8/09)

Obama's Intelligence Adviser Involved in Security Breach (1/12/09)

Catch Me If You Can.pdf (1/09: Wired Magazine)

Kyrgyzstan under cyber attack

Google Video search results poisoned to serve malware (1/27/09)

IT expert executed in Iran (12/1/08)

Indictments in huge hacking & theft case (8/5/08)

Blackhat Europe, Day 1: The Waag, the Bulldog, and web application hacking (3/25/08)

Zone-H web defacement data shows platforms don’t matter (3/17/08)

Hackers At Harvard! University Admits Security Breach (3/14/08)

- CIA: Cyberattack caused multiple-city blackout (1/22/08)
- Hackers attacking US utilities overseas (1/20/08)
- CIA reveals that hackers were responsible for power outages (1/18/08)

Is there a rootkit stashed in your boot record? (1/9/08)

Trojan attacks bank accounts, automates wire transfers (12/18/07)

Cracking open the cybercrime economy (12/14/07)

Securing Microsoft: Inviting the hackers inside (12/4/07)

U.S. Electronic Surveillance Monitored Israeli Attack On Syria (11/21/07 Aviation Week) - as the countrywide Syrian radar was shut down during this operation, computer to computer hacking is implicated.

Sunbelt Software: Google search results delivering massive malware attacks (11/27/07)

Hacker finds 492,000 unprotected Oracle, SQL database servers (11/14/07)

Microsoft exec calls XP hack 'frightening' (11/13/07)

'Botmaster' admits infecting 250,000 computers (11/10/07)

Mac Attack: Porn video lures dropping DNS-changer Trojan (11/1/07)

Attack of the PDFs (10/23/07)

IE users beware: RealPlayer zero-day flaw under attack (10/19/07) - get the security patch

Symantec intercepts Microsoft Word exploit (10/11/07)

The botnet attack on Estonia last spring nearly shut down the most wired country in Europe.pdf (9/15/07: Wired Magazine)

Sensitive government e-mails leak through Tor exit nodes (9/10/07)


Storm Worm botnet could be world’s most powerful supercomputer (9/6/07)

Bank of India site hijacked, launching exploits (8/30/07)

Can Microsoft ever stop kernel tampering in Vista? (8/21/07)

Exploits, security tools disappear as German anti-hacker law takes effect (8/13/07)

Focus: Black Hat

Stiffer Cyber Laws to Crack Down on Botnets, Spyware (6/4/07)

Defeating UAC with a two-stage malware attack (5/16/07)

Linkin Park's Mysterious Cyber-stalker (5/15/07: Wired Magazine)

Data thefts at TJX lasted 17 months: Duration of hacking called unprecedented in such cases (4/14/07: The Baltiimore Sun)

Cyber-crooks exploiting new Windows DNS flaw (4/12/07)

Microsoft makes copying Vista a monster task (3/30/07)

Microsoft confirms Windows zero-day, drive-by exploits (3/29/07)

Russian (Gozi) Trojan powering massive ID-theft ring (3/21/07)

AOL phisher faces up to 101 years in prison. (1/16/07)

Microsoft makes Windows more secure but it may not matter (12/17/06)


Microsoft engaging with hackers, seeking the help of those who besiege Windows at the world's largest hacker conference. (10/6/06)

Chinese computer hackers target US Commerce Department. (10/6/06)

Hackers building 'botnet' with AOL instant messaging worm...
(9/20/06)

Hackers building 'botnet' with AOL instant messaging worm... (9/20/06)

Point and Click DDoS Attacks (7/21/06: The Washington Post)

MySpace Attacked by Flash Worm (7/17/06: The Washington Post)

Five Arrested in Theft Of LexisNexis Data (7/1/06: The Washington Post)

Nuclear agency computers hacked: Stolen file contained unclassified information on 1,500 contract workers (6/9/06: MSNBC)

Circuit City Closes Web Security Hole (Washington Post: 6/2/06)

Personal Data on Veterans Is Stolen: Burglary Leaves Millions at Risk Of Identity Theft (5/23/06: Washington Post)

Building A Botnet

Invasion of the Computer Snatchers (22/19/06: Washington Post)

NASA Hacker Breaks Silence: 'There's An E-T Conspiracy Going On' World's biggest hacker held (6/8/05)

Hacker Hunters - An elite force takes on the dark side of computing (5/30/05: Business Week)

Hack most wireless LANs in minutes! (3/11/05)

Hackers breach LexisNexis, grab info on 32,000 people (03/09/05)

Melita Norwood: A secret life (9/12/99)

Microsoft Security Flaws Renew Calls For Alternative Web Browsers (7//3/04)

Black Demon targets computer hackers (4/28/04)

Hacking and Internet Crimes Govt. Explains How It Caught "Blaster" Author Hackers break into database at UT-Austin (3/6/02)

China Prevented Repeat Cyber Attack On US by Pamela Hess UPI Pentagon (10/29/02)

Cable ISPs join war on file-sharing

Attack cripples key Internet computers

"A University of Tulsa professor has been granted nearly $1 million to do groundbreaking research on the dangers cyberterrorism poses to the nation's telephone networks."

Without XPdite, or XP's Service Pack 1, clicking on a simple, but malicious, URL can delete the entire contents of your directories.

Cybernarks - Who's hunting the Hackers?

New hacker tool could target Web servers

From Code Red to Code Dread

Parasitic Computing

Researchers Pull Hacker Report After Lawsuit Threat

Is China's Guandong province ground zero for hackers?

Password Thief Ransacks AOL by Chris Oakes

'Love-bug' virus result of gang war, say hackers
hactivism.org

cult of the dead cow

on Friday, a government source told MSNBC that the nation's most sensitive nuclear weapons research facility was the victim of crackers

Kashmir-minded Pakistani 'hacktivists' blitz Web sites

If you are the original creator of material featured on this website and want it removed, please contact the webmaster.
Copyright © 1998-2006 Charles Michael Beaver.