Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Stephen Hawking
Posts Tagged ‘barrett brown’
Most Recent
Read More
July 19, 2015

Anonymous Journalist Barrett Brown Reboots Column From Prison

Readers may remember the story of Barrett Brown, the man who faced 45 years in prison for sharing a link to documents stolen by hackers and made available to him and Project PM. According to Brown himself, Project PM is:

Barrett Brown

[…] an informal association that would do two things: (1) disseminate information about the intelligence contracting industry and what is now being increasingly termed the “cyber-industrial complex,” including specific firms/outfits known to be involved in one or more of certain activities we oppose, and (2) provide whatever support possible to other parties that wish to pursue these [...]

Read More
January 1, 2015

WikiLeaks To Monetize Using

The @wikileaks Twitter account announced the next generation of the platform with a pair of tweets on Christmas Eve.

Read More
December 24, 2014

Free Speech Can Cost Prison Time: The Barrett Brown Story

The United States Constitution was written in the heady days following the American revolution, which was a break from what the founders deemed a corrupt, despotic bastion of totalitarianism. Their contention was not without foundation — elsewhere in the British empire, the Irish were banned from even speaking their native language. Freedom of expression as a guaranteed right was a new idea which would be continually challenged and upheld for the next couple hundred years.

Also read: Wikileaks’ Julian Assange May Have Saved Bitcoin

What Is That Oath For?

All officers of the federal government, including the FBI, are dutifully sworn to uphold the constitution, [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University