hacking
See the following -
Open-Source Hardware Hacking Effort 'Smacked Down' By USB Overlords [UK]
The USB Implementers Forum (USB-IF), the organisation that oversees the USB standard, has apparently sent the director of a small British electronics firm away with a flea in his ear for daring to suggest how it could make the lives of open-source hardware developers easier and cheaper.
- Login to post comments
Out In The Open: The Free Tools That Let You Hack Your Whole Life
Imagine a home speaker system that identifies everyone in the room and plays only the music they wanna hear... Read More »
- Login to post comments
Philadelphia Open Government 2011 Year in Review
2011 began with enormous potential for the growth of the open government footprint in Philadelphia because of a group of coders and designers that came to town as part of Code for America (CfA). Philadelphia was one of the CfA partner cities for 2011, and the group of fellows that came to town in the early part of the year wasted no time in making their presence felt.
- Login to post comments
Prospects For Comprehensive Cyber Reform Are Questionable
Congress is unlikely to pass a comprehensive cybersecurity reform bill this year, largely because public concern about computer hacking doesn’t sway elections, a recently-departed House Homeland Security Committee senior aide said. Read More »
- Login to post comments
Q&A: Why Was The VA Hacked?
In early June, a former Department of Veterans Affairs IT manager told members of the House Veterans Affairs Committee that the VA’s databases have been hacked by at least eight foreign organizations — notably by organizations linked with the Chinese military, which may have viewed (or taken) veterans’ personal identifying data, like Social Security numbers. Read More »
- Login to post comments
Rebooting Computer Crime Part 3: The Punishment Should Fit The Crime
In the wake of social justice activist Aaron Swartz's tragic death, Internet users around the country are taking a hard look at the Computer Fraud and Abuse Act (CFAA), the federal anti-hacking law. As we've noted, the CFAA has many problems. Read More »
- Login to post comments
Researcher Sounds Alarm On State Health Exchange Security
Several state healthcare exchanges established as part of the Affordable Care Act (ACA) appear buggy and easy to attack, a security researcher warned this week. Read More »
- Login to post comments
Security Hole In Healthcare.gov Exposed User Email Addresses
Healthcare.gov has been racked with technical problems since the site's launch, but a new vulnerability may have unintentionally exposed users... Read More »
- Login to post comments
Seven For ‘13
Ewan Davis looks back at 2012 and identifies the trends – from hackdays to open source to patient-held records – that will reshape NHS IT in 2013 and beyond. Read More »
- Login to post comments
Somebody Hacked The Fed During The Super Bowl
Two days after Anonymous bragged about its latest government website breach and data dump, the United States Federal Reserve admitted that it had been hacked and robbed. Read More »
- Login to post comments
Somebody, Probably Anonymous, Hacked The Fed During The Super Bowl
Two days after Anonymous bragged about its latest government website breach and data dump, the United States Federal Reserve admitted that it had been hacked and robbed. "The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product," a Fed spokesperson told Reuters... Read More »
- Login to post comments
Survey: Local, State Gov CIOs Underprepared For Attacks
Only about half of state and local government CIOs polled in a recent survey said they’re prepared for a cyber-attack — even as 28 percent of them reported experiencing a system hacking or attack attempt in the previous year. Read More »
- Login to post comments
The Truth About Aaron Swartz’s “Crime”
In short, Aaron Swartz was not the super hacker breathlessly described in the Government’s indictment and forensic reports, and his actions did not pose a real danger to JSTOR, MIT or the public. He was an intelligent young man who found a loophole that would allow him to download a lot of documents quickly. This loophole was created intentionally by MIT and JSTOR, and was codified contractually in the piles of paperwork turned over during discovery.
Read More »
- Login to post comments
This Little-Known Firm Is Getting Rich Off Your Medical Data
You may never have heard of it, but IMS Health knows an awful lot about your medical history. A global company based in Danbury, Connecticut, IMS IMS 1.58% buys bulk data from pharmacy chains such as CVS CVS 0.72% , doctor’s electronic record systems such as Allscripts, claims from insurers such as Blue Cross Blue Shield and from others who handle your health information...
- Login to post comments
U.S. Department of Homeland Security Warns of Cybersecurity Issues with Those Using Pyxis SupplyStation
Flaws within more that 1,4oo cybersecurity third-party software have been found by the U.S. Homeland Security department that are used with Pyxis SupplyStation automated medical supply cabinet. Pyxis’ medical supply cabinet is made by Becton Dickinson & Co. subsidiary CareFusion...
- Login to post comments