18 Results for

phreaking

Article

Unlocking Ma Bell: How phone phreaks came to be

In "Exploding the Phone," Phil Lapsley writes an entertaining and educational history of the people who hacked the original phone networks. Lapsley talked to CNET about his book.

By February 12, 2013

Article

NSA keywords become fodder for automated haiku

NSA surveillance keywords are transformed into odd poetry with the NSA Haiku Generator.

By October 30, 2013

Article

Buzz Out Loud 1282: Think globally, store locally (podcast)

It's our annual scare-the-bejesus out of ourselves episode, wherein we discuss all of the scary things that were announced and demonstrated at DefCon this year. Seriously, DefCon is way past phone phreaking and seriously into national security right now. Yikes. Also, new Apple jailbreaks are available, the BlackBerry doesn't pass Middle Eastern muster, and we've got the ultimate solution to Internet privacy concerns: data locavores.

By August 2, 2010

Video

Ep. 1282: Think globally, store locally

It's our annual scare-the-bejesus out of ourselves episode, wherein we discuss all of the scary things that were announced and demonstrated at DefCon this year. Seriously, DefCon is way past phone phreaking and seriously into national security right now. Yikes. Also, new Apple jailbreaks are available, the BlackBerry doesn't pass Middle Eastern muster, and we've got the ultimate solution to Internet privacy concerns: data locavores.

By August 2, 2010

Article

Security reporter hit by 'swatting' attack

A well-respected computer security reporter says he was the target of a con that sent an armed SWAT team to his front door.

By March 15, 2013

Article

Homebrew Computer Club reunion lights up Silicon Valley

Thirty-eight years after the famous club had its first meetings, spawning Apple and many other companies, many of its members got together to share stories of the beginnings of the PC era.

By November 11, 2013

Article

Kevin Mitnick shows how easy it is to hack a phone

Famed hacker shows how easy it is for anyone, not just British tabloid journalists, to access a stranger's mobile phone voice mail.

By July 7, 2011

Article

NSA director finally greets Defcon hackers

National Security Agency Director Gen. Keith Alexander calls Defcon the "world's best cybersecurity community" and asks for their help.

By July 27, 2012

Article

Steve Jobs revealed blackmail fears, drug use in DOD document

A Defense Department document shows that the late Apple leader admitted to drug use, an arrest for an unpaid traffic ticket, and fears that his daughter might be kidnapped.

By June 11, 2012

Article

Hackers build private 'Ninja Tel' phone network at Defcon

Network uses phones running the "Ninja OS," which features innovative apps such as "BoozeFone," where people can exchange beverages using what I dubbed "booze networking."

By July 28, 2012