recommended reading

author archives

Results 121-130 of 369

Inside a Russian Hacking Ring

June 10, 2016 A man with intense eyes crouches over a laptop in a darkened room, his face and hands hidden by a black ski mask and gloves. The scene is lit only by the computer screen’s eerie glow. Exaggerated portraits of malicious hackers just like this keep popping up in movies and...

Will the Constitution Protect Your Next Smartphone?

June 4, 2016 More than a decade ago, the keynote speaker at a major annual cybersecurity conference strode into the spotlight and predicted the death of the password. “They just don’t meet the challenge for anything you really want to secure,” he told the audience of computer experts in San Francisco. The speaker...

Siri and Other Digital Assistants May Be Leaking Your Questions

May 24, 2016 For the last century, we’ve imagined a future where we’re surrounded by robotic butlers that are classy, smart and discreet. We wouldn’t think twice of asking an embarrassing question of a robo-assistant, or entrusting him/her/it with sensitive information, because the robot’s directive would be to serve only its owner. Already,...

Foreign Hackers May Be Targeting US Presidential Candidates

May 19, 2016 As presidential candidates tack and weave through their primary races and toward their upcoming party conventions, the eyes of voters—and indeed, the eyes of the world—are on them. But a few groups are watching especially closely. Hackers have been spying on candidates and their campaigns, said James Clapper, the director...

from govexec

Foreign Hackers May Be Targeting U.S. Presidential Candidates

May 18, 2016 As presidential candidates tack and weave through their primary races and toward their upcoming party conventions, the eyes of voters—and indeed, the eyes of the world—are on them. But a few groups are watching especially closely. Hackers have been spying on candidates and their campaigns, said James Clapper, the director...

Iraq Shut Down Its Internet to Prevent Sixth-Graders From Cheating

May 17, 2016 The exam room is quiet, and you’re on a roll. You’re calculating percentages and ratios like a pro when suddenly—could it be? You forget the difference between a mean and a median. You slip your phone out of your pocket and stealthily open Google, but it won’t load. You glance...

Who Will Own Your Data If the Tech Bubble Bursts?

May 15, 2016 Imagine that Silicon Valley’s nightmare comes true: The bubble bursts. Unicorns fall to their knees. The tech giants that once fought to attract talented developers with mini-golf and craft beer scramble to put out fires. This is the setting of a cyber-doomsday scenario developed by researchers at Berkeley’s Center for...

The Computer Virus That Haunted Early AIDS Researchers

May 10, 2016 After booting up their computers one day in late March, scores of employees at MedStar, a sprawling health-care system with 10 hospitals in the Washington-Baltimore area, were greeted with a menacing ransom note. Their computer systems had been taken over, the note said, and vital files had been locked away....

After ISIS, Americans Fear Cyberattacks Most

May 6, 2016 When the Pew Research Center asked 2,000 Americans last month to react to various potential international threats to the U.S., their number-one worry was ISIS. That’s no surprise: The terrorist group is scary by design, relying on propaganda videos and ultra-violent attacks to spread fear and project power. Pew had...

After ISIS, Americans Fear Cyberattacks the Most

May 5, 2016 When the Pew Research Center asked 2,000 Americans last month to react to various potential international threats to the U.S., their No. 1 worry was ISIS. That’s no surprise: The terrorist group is scary by design, relying on propaganda videos and ultraviolent attacks to spread fear and project power. Pew...