In March, Wikileaks started publishing alleged CIA documents concerning the agency’s hacking operations and capabilities. Wikileaks also said it had obtained details of vulnerabilities CIA hackers took advantage of, and offered to provide these to affected vendors so the issues could be fixed.
Twitter has rolled out its new @-replies to me about three or four times now, ambushing me with its unspeakable badness on the iPhone app or web Twitter. Today it rolled out for everyone and it makes me want to throw all my devices at a wall.
Financial and medical information. Social Security numbers. Web browsing history. Mobile app usage. Even the content of your emails and online chats. These are among the types of private consumer information that House Republicans voted on Tuesday to allow your internet service provider (ISP) to sell to the highest bidder without your permission, prompting outrage from privacy watchdogs.
To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America’s heartland have started hacking their equipment with firmware that’s cracked in Eastern Europe and traded on invite-only, paid online forums. Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform “unauthorized” repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.
At 11:59 am eastern, the official White House website had a lengthy information page about the threat of climate change and the steps the federal government had taken to fight it. At noon, at the instant Donald Trump took office, the page was gone, as well as any mention of climate change or global warming.
Image: Flickr/ Konrad Förstner Netsweeper is a small Canadian company with a disarmingly boring name and an office nestled among the squat buildings of Waterloo, Ontario. But its services-namely, online censorship-are offered in countries as far-flung as Bahrain and Yemen. In 2015, University of Toronto-based research hub Citizen Lab reported that Netsweeper was providing Yemeni rebels with censorship technology.
Written by Thomas Rid In the wee hours of June 14, the Washington Post revealed that “Russian government hackers” had penetrated the computer network of the Democratic National Committee. Foreign spies, the Post claimed, had gained access to the DNC’s entire database of opposition research on the presumptive Republican nominee, Donald Trump, just weeks before the Republican Convention.
One of the nation’s most powerful appeals courts ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking.
If storing the personal data of almost 5 million parents and more than 200,000 kids wasn’t bad enough, it turns out that hacked toymaker VTech also left thousands of pictures of parents and kids and a year worth of chat logs stored online in a way easily accessible to hackers.
Watercolour of Ada Lovelace, by A E Chalon, c. 1838 (cropped). Image: Science Museum/SSPL Ada Lovelace’s legacy is as contentious, perhaps, as her own colourful life as a female mathematician in the 1800s.
The hacking conference Def Con has always had an adversarial relationship with government workers, or, as they’re commonly referred by the attendees, feds. After the revelations of government spying brought forth by documents leaked by Edward Snowden two years ago, Ambassador Joseph DeTrani, a little-known official who had nothing to do with the NSA, was repeatedly booed and heckled during his talk.
My wife Jackie has severe asthma. Thanks to the ridiculous state of health care in the United States, I was recently forced to commit a crime in order to get her the medicine she needs to live. Jackie has to use a maintenance inhaler twice per day, every single day, and will continue to use it for the rest of her life.
If you’re making an app for an an Apple device, Cupertino now wants you to encrypt all the things.
As anyone that’s ever experienced even a fleeting existential moment knows well enough that time is relative. Or, rather, the perception of time is relative. My minute is not your minute, probably, though we’re still quantitatively traveling according to the same basic clock. Time drags and time flies, yet it always arrives on schedule.