hacking
See the following -
China Has Repeatedly Hacked Veterans Affairs Databases Since 2010, Lawmaker Says
Since 2010, foreign actors have repeatedly compromised an unencrypted database maintained by the Veterans Affairs Department that contains personally identifiable information on roughly 20 million veterans, a House lawmaker said Tuesday. Read More »
- Login to post comments
Hack To Help The Philippines
The Philippines can take any help it can get right now, totally devastated last weekend by the typhoon that struck the island nation off the coast of Vietnam in the Pacific. While your immediate inclination may be to donate cash and be done with it – and no, this is not telling you not to donate – there are many other routes through which you can help the relief efforts. Saturday in D.C., one group will join together to help through hacking. Read More »
- Login to post comments
How Hackers Beat the NSA In The ’90s and Can Do It Again
While the world parses the ramifications of the National Security Agency’s massive snooping operation, it’s important to remember an earlier government attempt at data collection and, more important, how a group of hackers and activists banded together to stop it. Read More »
- Login to post comments
10 Reasons To Fear LinkedIn’s New Service
The business social media network wants to rout your email. The benefits to you are unclear... Read More »
- Login to post comments
2013 Open Hardware Summit
After attending the annual Open Hardware Summit in both 2011 and 2012, I returned again this year to revel in the excitement that surrounds the open source hardware community. Every year, the summit continues to grow, with over 500 people attending this year’s summit. Held on the MIT campus, this year’s summit did not disappoint [...]. Read More »
- Login to post comments
36 Governments (Including Canada’s) Are Now Using Sophisticated Software To Spy On Their Citizens
A new report from Citizen Lab, a Canadian research center, shows surveillance software sold by FinFisher, a “governmental IT intrusion” company owned by the UK-registered Gamma International, is now active in 36 countries. That’s up from the 25 countries reported two months ago. Read More »
- Login to post comments
8 Out of 10 Mobile Health Apps Open to HIPAA Violations, Hacking, Data Theft
A new report shows 84 percent of U.S. FDA-approved health apps tested by IT security vendor Arxan Technologies did not adequately address at least two of the Open Web Application Security Project top 10 risks. Most health apps are susceptible to code tampering and reverse-engineering, two of the most common hacking techniques, the report found. Ninety-five percent of the FDA-approved apps lack binary protection and have insufficient transport layer protection, leaving them open to hacks that could result in privacy violations, theft of personal health information, as well as device tampering and patient safety issues...
- Login to post comments
8 Out of 10 Mobile Health Apps Open to HIPAA Violations, Hacking, Data Theft
A new report shows 84 percent of U.S. FDA-approved health apps tested by IT security vendor Arxan Technologies did not adequately address at least two of the Open Web Application Security Project top 10 risks. Most health apps are susceptible to code tampering and reverse-engineering, two of the most common hacking techniques, the report found. Ninety-five percent of the FDA-approved apps lack binary protection and have insufficient transport layer protection, leaving them open to hacks that could result in privacy violations, theft of personal health information, as well as device tampering and patient safety issues...
- Login to post comments
A Deadly Equation Of Acronyms: NHS+IT=FUBAR
I've recently had the pleasure of taking part in two hacker events organised within the context of healthcare and, specifically, the UK's National Health Service.[...] To be clear (and more seriously), I am using the term "hacker" in the way it is used within Information Technology circles: a hacker is a person with a passion for exploring and solving problems through writing and sharing software. Read More »
- Login to post comments
After Stuxnet: The New Rules Of Cyberwar
Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware. Read More »
- Login to post comments
Applications Now Open For 2014 OpenNews Fellowships
Today we’re proud to announce the start of the 2014 Knight-Mozilla OpenNews Fellow application process. Read More »
- Login to post comments
Carmen Ortiz And Stephen Heymann: Accountability For Prosecutorial Abuse
Imposing real consequences on these federal prosecutors in the Aaron Swartz case is vital for both justice and reform Read More »
- Login to post comments
China Isn’t Wrong To Call The U.S. "The Real Hacking Empire"
The cyberwar between China and the US has spread from computers into the halls of diplomacy. In a report this week, the Pentagon said for the first time that the Chinese government and military have been launching cyber attacks against the US. Today, Chinese state media called the US “the real hacking empire” and said the country has “an extensive espionage network.” Read More »
- Login to post comments
CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous
The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »
- Login to post comments
Coding Sub-Zero
Despite a lack of heating and a rather unreliable internet connection, spirits were high at NHS Hack Day, Oxford. Lis Evenstad reports. Read More »
- Login to post comments