18 Results for

phreaking

Article

Unlocking Ma Bell: How phone phreaks came to be

In "Exploding the Phone," Phil Lapsley writes an entertaining and educational history of the people who hacked the original phone networks. Lapsley talked to CNET about his book.

By February 12, 2013

Article

Homebrew Computer Club reunion lights up Silicon Valley

Thirty-eight years after the famous club had its first meetings, spawning Apple and many other companies, many of its members got together to share stories of the beginnings of the PC era.

By November 11, 2013

Article

NSA keywords become fodder for automated haiku

NSA surveillance keywords are transformed into odd poetry with the NSA Haiku Generator.

By October 30, 2013

Article

Security reporter hit by 'swatting' attack

A well-respected computer security reporter says he was the target of a con that sent an armed SWAT team to his front door.

By March 15, 2013

Article

Hackers build private 'Ninja Tel' phone network at Defcon

Network uses phones running the "Ninja OS," which features innovative apps such as "BoozeFone," where people can exchange beverages using what I dubbed "booze networking."

By July 28, 2012

Article

NSA director finally greets Defcon hackers

National Security Agency Director Gen. Keith Alexander calls Defcon the "world's best cybersecurity community" and asks for their help.

By July 27, 2012

Article

Steve Jobs revealed blackmail fears, drug use in DOD document

A Defense Department document shows that the late Apple leader admitted to drug use, an arrest for an unpaid traffic ticket, and fears that his daughter might be kidnapped.

By June 11, 2012

Article

The 404 880: Where we separate the hacks from the cracks (podcast)

Today we're taking issue with the misuse of the word "hacked." With news stories about Stuxnet, PlayStation 3, and News of the World throwing around the term with no specific definition, we define exactly what it means to hack...at least according to the Computer Fraud and Abuse Act.

By August 11, 2011

Article

Kevin Mitnick shows how easy it is to hack a phone

Famed hacker shows how easy it is for anyone, not just British tabloid journalists, to access a stranger's mobile phone voice mail.

By July 7, 2011

Video

Ep. 1282: Think globally, store locally

It's our annual scare-the-bejesus out of ourselves episode, wherein we discuss all of the scary things that were announced and demonstrated at DefCon this year. Seriously, DefCon is way past phone phreaking and seriously into national security right now. Yikes. Also, new Apple jailbreaks are available, the BlackBerry doesn't pass Middle Eastern muster, and we've got the ultimate solution to Internet privacy concerns: data locavores.

By August 2, 2010