The Quest for the Righteous Hack
A variety of people from all walks of life read these blogs. Although I am what you’d call a reformed hacker, my perspective on certain aspects of the hacker subculture…
A variety of people from all walks of life read these blogs. Although I am what you’d call a reformed hacker, my perspective on certain aspects of the hacker subculture…
She sits at her computer, sipping from a crystal glass of wine while listening to music. The mixture drives her warfare like the berserker warriors of old Norse legends, while…
One of the most important functions within the cybersecurity industry is the freedom to share research data and collaborate with other industry players in an effort to inform, warn, and…
Every connected device on the internet exists as a nexus state, like a global mesh of neurons firing through brain synapses, as critically important information passes through this enormous hive…
The famous words of The Mentor in his revered 1986 manifesto called The Conscience of a Hacker still resonate today among our multifaceted hacker subculture, immortalized within the digital pages…
Most of the hackers I know from the circles I have traveled in started when they were still in grade school or college. Their journey began with simple experiments from…
In 2009, Jesse William McGraw, aka “GhostExodus” and the leader of the so-called Electronik Tribulation Army (ETA) hacking group, broke into a dozen computers at the orthopedic W.B. Carrell Memorial…
The world isn’t the way I remember it, and certainly not the way I left it back when I was arrested in 2009 for installing botnets and commercial remote access…
The world isn’t the way I remember it, and certainly not the way I left it back when I was arrested in 2009 for installing botnets and commercial remote access…
Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide a detailed information platform that can stitch together…