272 Results for

hijacked

Article

Hijack the movies with bespoke screenings of your favourite flick

A cinema chain in the UK lets you choose from 200 movies to design your own crowdsourced screening.

By August 1, 2014

Article

Piracy police hijack ads on copyright-infringing websites

British police have come up with a new way of cutting off funding to websites that illegally share music and movies.

By July 29, 2014

Article

Stolen Twitter handle @N returned to hijacking victim

A coveted username lost to a hijacker last month is returned to its rightful owner.

By February 25, 2014

Article

Chrome fights back against settings hijackers

Google makes it even easier to reset your browser settings. Apparently, it's the No. 1 Chrome complaint.

By January 31, 2014

Article

Obama's Facebook and Twitter updates hijacked in URL exploit

The president's social media accounts temporarily directed people who clicked on compromised links to a video titled "Syria facing terrorism."

By October 28, 2013

Article

WhatsApp Web site hijacked, shows pro-Palestinian message

A group called KDMS Team claims credit for taking over the Web site of the popular messaging service, which is used to send billions of messages a day.

By October 8, 2013

Article

Anti-hijacker trap door among loony Ig Nobel prizes

Also honored: research into the beer-goggle effect, walking on lunar water, and the probability of cows lying down.

By September 13, 2013

Article

Students hijack US$80m yacht with GPS spoofing

Students from the University of Texas created a custom GPS spoofing device that allowed them to take over a superyacht's navigation system, changing its course.

By July 29, 2013

Article

Syrian Electronic Army hijacks Thomson Reuters' Twitter feed

Pro-Assad hacking group apparently commandeers the financial information firm's Twitter account, sending out illustrations backing the Syrian president.

By July 29, 2013

Article

SIM card flaw said to allow hijacking of millions of phones

Vulnerability in the security key that protects the card could allow eavesdropping on phone conversations, fraudulent purchases, or impersonation of the handset's owner, a security researcher warns.

By July 21, 2013