use a computer to gain unauthorized access to data in a system.
Questions tagged [hacking]
27 questions
75
votes
1 answer
Did the maps for services such as Snapchat, CitiBike and StreetEasy label New York City as “Jewtropolis” for a brief amount of time?
While checking my Twitter feed this morning (August 30, 2018) I came across this tweet that claimed that services like Snapchat, CitiBike and StreetEasy renamed New York City as “Jewtropolis.” Screenshots below.
Did this event actually happen? Were…

Giacomo1968
- 5,508
- 6
- 25
- 52
36
votes
2 answers
Did 17 U.S. intelligence agencies claim that Russia was behind the DNC hack?
It has been reported repeatedly that 17 U.S intelligence agencies have come out publicly to say that the Russian government was behind the 2016 Democratic National Committee Email Leak
For example, from the Washington Post:
“We have two choices:…

dan-klasson
- 576
- 5
- 11
35
votes
1 answer
Is using a mouse less efficient?
Users of programmable text editors such as Emacs and Vim claim that using a mouse for day-to-day programming and computing tasks makes you less efficient.
For example, in this playful Welcome to Vim video by Derek Wyatt, he calls the mouse a…

Nick
- 453
- 4
- 6
25
votes
1 answer
Can a computer be hacked to use a connected speaker as a microphone?
I read a book in which someone hacked into a computer and used the speakers (not a microphone) to listen to what was happening in the room. Is this even remotely possible without gaining physical access to the computer, assuming you could completely…

John Stimac
- 377
- 3
- 6
19
votes
2 answers
Did the New York Post publish authentic email correspondence of Hunter Biden?
The New York Post recently published a story (October 2020) alleging it had found a cache of emails on a laptop apparently belonging to Hunter Biden that demonstrate widespread allegations of nepotism and corruption during US vice presidential spell…

matt_black
- 56,186
- 16
- 175
- 373
17
votes
2 answers
Do the "Presidential Alerts" give the government full access to all phone functionality?
John McAfee, libertarian politician and former computer programmer, tweeted this:
The "Presidential alerts": they are capable of accessing the E911 chip
in your phones - giving them full access to your location, microphone,
camera and every…

James G.
- 1,942
- 2
- 13
- 23
15
votes
1 answer
Could the Nokia 1100 be hacked to sniff SMS messages intended for third parties?
TL; DR; version: Is it possible that hackers were somehow able to "reprogram" a specific Nokia 1100 phone to make it receive SMS messages sent to another person's phone number?
A couple of years ago, a friend of mine asked me if I happen to have an…

fstanis
- 1,409
- 1
- 13
- 16
14
votes
1 answer
Is the Chinese government responsible for hacking U.S businesses and government?
Over the past 18 months there have been several news articles pointing the finger at the Chinese government over hacks on U.S government and businesses.
Most recently: China Suspected of Hacking US Defense Firms, Others — Largest Theft 'In…

going
- 18,069
- 18
- 86
- 151
14
votes
1 answer
Has anyone ever hacked into a traffic control system to change the stoplights?
This is a relatively common trope with regards to the powers of hackers in film: Someone hacks into the "Traffic Control Center" and gains instant access to all stoplights in an area. This includes the option of turning everything red; everything…

MrHen
- 6,113
- 37
- 59
14
votes
1 answer
Can aircraft be hacked and "commandeered remotely"?
This sensationalist article by John McAfee on Business Insider makes a number of unsupported claims about cybersecurity.
In the article, he claims that (emphasis mine):
For the purpose of our discussion I'm going to ignore the near certainty that…

March Ho
- 18,688
- 12
- 81
- 109
11
votes
1 answer
Can Doom run on a car's infotainment system?
In this youtube video a hacker claims it is easily possible to mod the infotainment system in his Porsche to run the game Doom using the controls of his car to control the game.
This Gizmodo/Sploid story describes the supposed hack:
A YouTuber…

matt_black
- 56,186
- 16
- 175
- 373
10
votes
0 answers
Did two brothers steal credit card information worth millions and walked away scot-free because banks were embarrassed?
In this DEFCON talk at around 24:52 minute mark, the speaker (a Cambridge professor) tells a story of two brothers stealing millions of dollars using a weakness in credit card terminal technology, and then walking away scot-free because banks were…

Xyzk
- 221
- 1
- 5
9
votes
2 answers
Can diabetics with pumps be killed from a half mile away?
Black Hat: Lethal Hack and wireless attack on insulin pumps to kill
people Like something straight out of science fiction, an
attacker with a powerful antenna could be up to a half mile away from
a victim yet launch a wireless hack to…

user179700
- 292
- 3
- 6
9
votes
0 answers
Were the BOSS Linux update servers hacked in 2015?
The Hackology Blog claims that update servers for BOSS Linux were hacked in 2015, eventually allowing access to Indian military and government servers.
This website claims that:
Hackers infected the update servers and repositories which means they…

merecske
- 91
- 2
9
votes
3 answers
Was John Podesta's email password "password"?
Julian Assange, founder of Wikileaks, said in a recent interview with Sean Hannity that John Podesta’s password was 'password'.
The Daily Mail reports:
In an interview, Assange revealed the campaign chairman's password was 'password' and that he…
user36356