• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Hackers set off 156 emergency sirens in Dallas over dozen times

{{postValue.id}}

hacker

A hacker set off all of 156 emergency sirens in city of Dallas on Friday midnight. According to reports, the sirens started to blare before midnight on Friday and was shut off for the first time by city officials, but it was hacked again and set off almost a dozen times prompting the officials to shut down the system entirely around 1.20 am on Saturday morning provoking the fear among residents.

The city tried to inform its residents that there was no emergency via Twitter, but the 911 system was flooded with calls and it received more than 4,400 calls between 11.30 pm Friday and 3 am Saturday morning. As the 911 call center was already short staffed, it staggered to reassure the residents that there was no actual emergency and to maintain peace in the city.

As of noon on Saturday, the city officials have discovered the root of the problem and trying to fix the issue. Apparently, the system has been reactivated and the city is working to implement more safeguards to minimize the damage of compromised system.

Officials still haven’ t had a clue for who was responsible for the hacking, but Rocky Vaz, director of Dallas office of Emergency Management said " with a good deal of confidence that this was someone outside our system" and in the Dallas area.

City officials are taking this incident more seriously and it raised questions among the residents. What kind of vulnerabilities does the system have? And How protected the city will be if it is hacked by external sources? Improvements must be made for the safety of citizens.

Tags:
isaiah
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

What are the 3 types of hackers?

A

Three Types of Hackers. The three types of hackers are the white hat hacker, the grey hat hacker, and the black hat hacker. Each type of hacker hacks for a different reason, a cause, or both.

Q

What is a blue hat hacker?

A

A blue hat hacker is someone outside computer security consulting firms who bug tests a system prior to its launch, looking for exploits so they can be closed. Blue Hat Hacker also refers to the security professional invited by Microsoft to find vulnerabilities in Windows.

Q

Who is a white hat hacker?

A

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

Q

What is an elite hacker?

A

Elite hacker is the name utilized by the community with the aim of identifying those individuals who are deemed to be as experts in their line of work. These people are actually on the “cutting edge” of both the computer and network industry.

Q

What does wearing a black hat mean?

A

The group is considered kind of a black hat in the consulting business. In a dysfunctional organization, it is often impossible to tell who are wearing the black hats, and who are wearing the white hats.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help keel johnston ?
Unhide the folders on windows Explorer

Give any solutions to unhide folder using command prompt?

forum3

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.