hacking

  • Risks And Red Lines As UK Prepares To Reforge Surveillance Law

    Risks And Red Lines As UK Prepares To Reforge Surveillance Law

    This year the U.K. has a historic opportunity to lead the world in creating a transparent legal framework for the operation of secret state surveillance powers. But there is a parallel risk of forging bad law and encouraging other countries down a similarly problematic path. The stakes could not be higher… Read More

  • Costs And Risks Of UK’s Draft Surveillance Powers Probed

    Costs And Risks Of UK’s Draft Surveillance Powers Probed

    A U.K. parliamentary committee tasked with scrutinizing the new surveillance powers contained in the draft Investigatory Powers Bill has heard several contradictory views on the proposed legislation. Read More

  • Dojo Is Designed To Protect Your Smart Home From Itself

    Dojo Is Designed To Protect Your Smart Home From Itself

    Israeli startup Dojo-Labs has it eye on securing the connected smart home from the threat posed by, well, all the devices that comprise the connected smart home… Read More

  • The Biggest Cybersecurity Risk Is Not Identity Theft Crunch Network

    The Biggest Cybersecurity Risk Is Not Identity Theft

    What would happen if a hacker edited a major news website to falsely report an anthrax attack in Times Square? Even if the site removed the story within minutes, it already would have been reposted and retweeted thousands of times. The misinformation likely would lead to crowded sidewalks, traffic accidents, overflowing hospitals, a plummeting stock market and other chaos. Read More

  • De-escalation Is The Answer To Today’s Growing Cyber Tension Crunch Network

    De-escalation Is The Answer To Today’s Growing Cyber Tension

    Leading up to Chinese President Xi Jinping’s visit to the United States, media buzzed with talk of an unprecedented cybersecurity agreement on par with previous governance around the creation and handling of nuclear, chemical and biological weapons. But what was built up to be the first arms control accord for cyberspace actually turned out to be quite anticlimactic. Read More

  • Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Years after Google implemented a similar feature for Gmail users, Facebook says it will begin alerting users if it suspects they’re a target of state-sponsored attacks. That is, if the network believes a user’s account has been either targeted or already compromised by an attacker working on behalf of a nation-state, Facebook will pop up a notification warning them of the incident… Read More

  • The Hacking Quandary Crunch Network

    The Hacking Quandary

    This summer, two different events affected two different worlds. First, Milan-based Hacking Team — a small group of programmers who customize malware to gather intelligence — was itself hacked, and more than 400GB of its internal data was leaked. A few days later, a South Korean intelligence officer who had been implementing tracking software killed himself, and his suicide… Read More

  • How To Keep IoT Hunters And Poachers Out Of Your Food And Farms Crunch Network

    How To Keep IoT Hunters And Poachers Out Of Your Food And Farms

    A drone equipped to “sniff” Zigbee flew over an Austin neighborhood in early August and found almost 1,600 devices. It’s a sign of how ubiquitous these technologies have become, and how we use them every day — despite their vulnerabilities. As we connect more devices to our lives, I can’t help but wonder, can hackers hurt, hunt or poach our local food… Read More

  • To Fix Cybersecurity Law, Ask More Questions Crunch Network

    To Fix Cybersecurity Law, Ask More Questions

    When a company realizes that it may have been hacked, its first call often is not to outside forensics consultants, security firms or even to law enforcement. Too often, the company first must consult with its lawyers. Lots and lots of lawyers. And for good reason. Our system of cybersecurity and privacy laws is difficult to navigate, and exposes companies to large penalties for failure to… Read More

  • APIs Are The New FTEs Crunch Network

    APIs Are The New FTEs

    Facebook, Google and Twitter have to deal with outrageous amounts of spam and abuse. They hire teams of engineers to stop trolls, outwit bad actors and otherwise keep their walled gardens free of misanthropes. It’s a costly business. Huge teams of Full-Time Employees, or FTEs, are charged with stopping these attacks at other companies, and it’s easy to imagine millions of dollars… Read More

  • Hacking For Cause: Today’s Growing Cyber Security Trend Crunch Network

    Hacking For Cause: Today’s Growing Cyber Security Trend

    What do the following data-breach headlines from the past year have in common? The Sony Pictures hack: Everything we know so far; Anonymous hackers release emails ordering bear cubs be killed; Hackers threaten to release names from adultery website … Connecting the dots yet? Read More

  1. 1
  2. 2
  3. ...