Inteligencia y Seguridad Frente Externo En Profundidad Economia y Finanzas Transparencia
  En Parrilla Medio Ambiente Sociedad High Tech Contacto
Notas del mismo autor:  
 

14/01/2017 | Inteligencia y Seguridad
US - Mystery Hackers Blow Up Secret NSA Hacking Tools in ¨Final F--k You¨
A gang of elite hackers, believed by many to be Russian, say they’re quitting—just as Donald Trump gets ready to enter the Oval Office.
................................................................................................................................
13/05/2016 | High Tech
The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare
ONE THURSDAY IN January 2001, Maksym Igor Popov, a 20-year-old Ukrainian man, walked nervously through the doors of the United States embassy in London. While Popov could have been mistaken for an exchange student applying for a visa, in truth he was a hacker, part of an Eastern European gang that had been raiding US companies and carrying out extortion and fraud. A wave of such attacks was portending a new kind of cold war, between the US and organized criminals in the former Soviet bloc, and Popov, baby-faced and pudgy, with glasses and a crew cut, was about to become the conflict’s first defector.
................................................................................................................................
20/02/2005 | Inteligencia y Seguridad
Hacker penetrates T-Mobile systems
A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned.
................................................................................................................................
20/02/2005 | Inteligencia y Seguridad
Hacker penetrates T-Mobile systems
A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned.
................................................................................................................................
 
 
Center for the Study of the Presidency
Freedom House