Hackers

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

CIA sneak undetectable 'malicious' implants onto Windows OS - WikiLeaks
Article
2017
Windows machines are targeted by the CIA under 'Angelfire,' according to the latest release from WikiLeaks' 'Vault7' series. The documents detail an implant that can allow Windows machines to create u...
Documents Reveal Canada's Secret Hacking Tactics
Gallagher, Ryan
Article
2015
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Extraordinary Violence at 500 Pearl Street: The Sentencing of Jeremy Hammond
Tarrant, Anthony
Article
2013
On Friday, November 15, 2013, extreme violence with malicious intent was meted out by Federal District Court Judge Loretta Preska in the sentencing phase of 28 year old hacktivist Jeremy Hammond befor...
Hacktivist Jeremy Hammond Sentenced to 10 Years: His Idealism Remains at Large
Hayase, Nozomi
Article
2013
28-year-old political activist Jeremy Hammond was sentenced to 10 years in prison and three years of supervised release at the Federal District Court for the Southern District of New York. This was th...
Internet Hackers and the Real Threat They Expose: Government and Corporations are the Real Problem
Lopez, Alfredo
Article
2013
There were nearly ten major cyber attacks in August 2013 against very prominent targets such as The New York Times.
Jeremy Hammond's Court Statement Upon Being Sentenced To 10 Years In Jail
Hammond, Jeremy
Article
2013
Jeremy Hammond was sentenced to ten years in prison for hacking Stratfor communications, then releasing information to Wikileaks. This is his statement.
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
Fishman, Andrew; Marquis-Boire, Morgan
Article
2015
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n...
The Russian Hack That Wasn't
Roberts, Paul Craig
Article
2017
Glenn Greenwald of The Intercept exposes the fake news put out by the US Department of Homeland Security (an euphemistic name for a Big Brother operation that spies on US citizens) that Russia hacked ...
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
Article
2015
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
Stuxnet on the Loose: Security for the One Percent
Blunden, Bill
Article
2012
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
Surveillance Self-Defense
Website
2018
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Think the Left Won the Culture War? Think Again
deBoer, Fredrik
Article
2015
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
Wanted: A Hackers' Charter
Goldstein, Emmanuel
Article
We Are Legion: The Story of the Hacktivists
Knappenberger, Brian
Film
2012
A history of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age.

Sources Library

Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg
Janjevic, Darko
2015
Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software...
Dark Market
Cybethieves, Cybercops and You
Glenny, Misha
2011
Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...
Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders
Perpel, Rosie
2018
Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the centre of a massive Facebook-data scandal.
The Motherboard Guide to Not Getting Hacked
Motherboard Staff
2017
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb...
'Can you hear me?': New phone scam tricks you into answering 'yes'
Snowdon, Wallis
2017
Describes a new telephone scam being run in North America, wherein a recording of one's voice saying the word 'yes' is used to defraud victims.
Science's pirate queen
Alexandra Elbakyan is plundering the academic publishing establishment
Graber-Stiehl, Ian
2018
A profile of open access academic publishing activist Alexandra Elbakayan and the ongoing conflict between academics and for-profit academic publishing houses.
Spelling mistake prevented hackers taking $1bn in bank heist
Reuters
2016
New York Fed reveals spelling of 'foundation' as 'fandation' prompted bank to seek clarification and stop transfer, but hackers still got away with about $80m.
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
2012
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Watch your attachments: Microsoft Office bug lets hackers take over computers
2014
A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr...

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...