hacking
See the following -
Computer Viruses Are "Rampant" On Medical Devices In Hospitals
A meeting of government officials reveals that medical equipment is becoming riddled with malware. Read More »
- Login to post comments
Darrell Issa Probing Prosecution Of Aaron Swartz, Internet Pioneer Who Killed Himself
House Oversight Committee Chairman Darrell Issa (R-Calif.) is investigating the Justice Department's prosecution of Aaron Swartz, the Internet activist who committed suicide on Friday after fighting felony hacking charges for two years. [...] Read More »
- Login to post comments
Download Hosts Withdrawing
Fewer and fewer services offer open source projects the ability to host downloads of their binaries. Should we be worried? Read More »
- Login to post comments
Epic Hacker Projects Compete For A Trip To Space
A prize for hackers seeks the next transformative piece of open-source hardware. Its grand prize? Out of this world...
- Login to post comments
Evaluating the Harm from Closed-Source Healthcare Software
In a fantastic article on his blog at http://esr.ibiblio.org/, Eric S. Raymond, author of "The Cathedral and The Bazaar" goes to some lengths to quantify the damages and costs of using closed-source software in an organisation.
- Login to post comments
Feds Go Overboard In Prosecuting Information Activist
Violate website terms of use and you too could be a felon. Read More »
- Login to post comments
Google Cookies Are Pretty Mundane. So Why Do Spy Agencies Want Them?
Google cookies used by the NSA aren't much different from typical Web cookies, but when paired with other info, they can help home in on a particular user Read More »
- Login to post comments
GSA Seeks Governmentwide Mobile Device Management Contracts
The General Services Administration is seeking governmentwide contracts with vendors who can ensure the security of federal employees’ smartphones and tablets and the applications that run on them, solicitation documents show. Read More »
- Login to post comments
Hack the Programme
The geeks shall inherit the world of NHS IT. Or that was the hope of NHS Hack Day 2012. Chris Thorne spent a day with the coders, and found that even the 'old guard' and 'big wigs' were having fun. Read More »
- Login to post comments
Hacker Uses an Android To Remotely Attack And Hijack An Airplane
The Hack in the Box (#HITB2013AMS) security conference in Amsterdam has a very interesting lineup of talks [pdf]. One that jumped out was the Aircraft Hacking: Practical Aero Series presented by Hugo Teso, a security consultant at n.runs in Germany... Read More »
- Login to post comments
Hackers Execute Sophisticated Strike On Government Cybersecurity Contractor Bit9
Unprotected computers at a cybersecurity contractor that services the Defense Information Systems Agency and many other federal agencies were compromised in a way that enabled the company's product to run viruses on customer networks. Read More »
- Login to post comments
Handover System Wins NHS Hack Day
The NHS Hack Day 2012 was won by a group of clinicians and developers who produced an electronic patient task-list for doctors in just 24 hours. Read More »
- Login to post comments
Happy 15th Birthday, OSCON
Now in its 15th year, OSCON has shown that open source software is the standard for everyday programming languages, databases, utilities, and operating systems. At OSCON 2013, we'll celebrate the open source success story and its ongoing revolution. What can you contribute to this year's program? Read More »
- Login to post comments
Health Records Of Every NHS Patient To Be Shared In Vast Database
The health records of everyone in the NHS will be pooled in a vast database which can be accessed by researchers and pharmaceutical companies. But campaigners warn it could breach privacy. Read More »
- Login to post comments
Healthcare.gov Sends User Information To Third Parties, Violating Its Own Privacy Policy
Here's more evidence of cutting corners during the development of the Healthcare.gov insurance marketplace: the website appears to be violating its own privacy policy by sending private user information to third parties. Read More »
- Login to post comments