Hot on HuffPost Tech:

See More Stories
AOL Tech

Hacker Deletes 3,000 Photos From Man's Flickr Account

A Flickr user recently woke up to his worst nightmare. His account, to which he had uploaded more than 3,000 photos over five years, was hacked and terminated by someone using a Hotmail account. But that's not all.

According to Gawker, Morgan Tepsic, a photographer and student living in Taiwan, spent days sending e-mails and making phone calls to both Flickr HQ and Yahoo! (owner of the site), only to have customer service reps tell him there was no way to recover the photographs, which he says he spent thousands of dollars developing. Tepsic says Flickr should have gone further to protect his account (for which he paid subscription fees) from hackers. He's right on, especially since he never received so much as an e-mail asking him to confirm the account's termination. As it stands, we can only assume that Flickr users pay to use a site that doesn't even backup its data. Gawker tried to get to the bottom of the site's backup procedures, but its e-mails to Yahoo! reps weren't returned.

In the meantime, Tepsic has launched a viral campaign against the photo service. While it's not likely that Flickr or Yahoo! will offer assistance, maybe other users can at least learn from Tepsic's nightmare. Don't rely solely on Web backup. [From: Gawker]
http://xml.channel.aol.com/xmlpublisher/fetch.v2.xml?option=expand_relative_urls&dataUrlNodes=uiConfig,feedConfig,entry&id=505649&pid=505648&uts=1249506758
http://cdn.channel.aol.com/cs_feed_v1_6/csfeedwrapper.swf
World's Most Famous Hackers
Getty Images

Worlds Most Famous Hackers

    1. Kevin Mitnick
    Unlike many other hackers, Kevin Mitnick didn't use any computer programs or savvy tech-skills to gain access to networks. Rather, he essentially phished passwords, security codes, and the like by essentially hustling actual people. Still, he was convicted and spent five years in prison for unauthorized access to various computer networks in the late '90s. He was released in 2003 and now runs a computer security consulting firm called, naturally, Mitnick Consulting.

    Getty Images

    2. John Draper (AKA Captain Crunch, Crunch, or Cruncherman)
    John Draper is often seen as a legend from the early days of hacking. His expertise was phreaking -- he used a toy whistle (and later, other custom-built devices) to emulate signal tones that effectively hacked AT&T's phone system into rerouting phone calls around the world for no charge.The original whistle was found inside a box of Cap'n Crunch cereal, hence the name. In 1971, several months after the publication of an article in Esquire Magazine on phone phreaking, Draper was arrested for wire fraud. Steve Wozniak, of Apple fame, noticed the article and hired Draper at Apple Computer. Draper went on to write the first word processing application for the Apple II computer. Draper is still a software developer today and he hosts an Internet TV show, Crunch TV.

    3. Jonathan James (c0mrade)
    In 1999, at the age of 15, Jonathan James gained notoriety for breaking into the computer systems of the Department of Defense. Once in the system, he installed a sniffer application that allowed him to monitor employee usernames and passwords. He later admitted to the deed, but was able to plead out of the resulting wiretapping charges. A previous computer invasion at NASA was later traced back to James, and he was arrested and sentenced to six months of house arrest in 2000. James' arrest marked the first time a juvenile was sentenced for cybercrime in the U.S.

    4. Eric Corley (AKA Emmanuel Goldstein)
    In 1984, Eric Corley founded '2600 Magazine,' one of the world's most popular hacker publications. He was named a defendant in the DeCSS (a computer program that could decrypt encrypted DVDs) case in 1999 after the 2600 Web site (2600.com) posted links to the software. The movie industry obviously wasn't pleased, and Corley ultimately lost in court. Corley continues publishing '2600' today and hosts several radio shows.

    New York Times

    5. Adrian Lamo
    Dubbed "the Homeless Hacker," Adrian Lamo backpacked across the country for three years around the turn of the millennium, hitting Wi-Fi hotspots and public library computers, which he used to gain access to the computer networks to some of the world's most well-known companies (Yahoo!, Microsoft, Bank of America, and McDonald's, to name a few). He's probably best known for his 2002 infiltration of the New York Times' internal network -- where altered confidential databases and found the home phone numbers of contributors like Warren Beatty and Rush Limbaugh. In 2003, he was arrested by U.S. marshalls, and pleaded guilty to one count of computer crimes against Microsoft, the New York Times, and Lexis-Nexis. In the end, he was sentenced to six months house arrest for the stunt. Lamo has since become a successful journalist.

    6. Vasily Gorshkov and Alexey Ivanov
    In a sting operation in 2000, the FBI, operating under the guise of Invita Security (a dummy computer security company) contacted Vasily Gorshkov and Alexey Ivanov, two known Russian hackers. They were lured to the U.S. for an employment 'interview' with Invita, and were arrested and imprisoned on multiple counts of conspiracy, computer crime, and fraud, as they had already stolen over 50,000 credit card numbers from Internet service providers (ISPs) and online banks throughout the late '90s.

    7. Kevin Poulsen
    Kevin Poulsen's most famous hack involves taking over all of Los Angeles radio station KIIS-FM's telephone lines in order to ensure his place as the 102nd caller. The prize? A cool new Porsche 944 S2. In 1991, the feds tracked Poulson down for the Porsche stunt and other cybercrimes, and he was sentenced to four years in prison, a three-year ban on computing after release, and a $58,000 fine. Following hid release from prison, Poulsen began a successful career as a journalist and now works at Wired Magazine.

Tags: backup, cloud computing, CloudComputing, customer service, CustomerService, flickr, hack, photos, top, yahoo

Comments

14

Add your comments

Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.

When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.

To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.