Several United States government and intelligence officials have expressed concern that a sweeping data breach of the Office of Personnel Management, first reported in early June, might have further ramifications. Continue reading
Driving on a highway in St. Louis, WIRED writer Andy Greenberg allowed himself to get car-hacked. Two researchers were able to remotely blast the stereo on his SUV, turn on the windshield wipers and kill the engine. Today, vehicles function almost like smartphones on wheels, but that convenience allows hackers to engage in wireless sabotage. Greenberg joins Hari Sreenivasan to discuss the dangers. Continue reading
Google said Friday that the company will begin allowing users to request that nude or sexually explicit images posted without their consent be removed from Google search results.
Deeply personal information submitted by U.S. intelligence and military personnel for security clearances – mental illnesses, drug and alcohol use, past arrests, bankruptcies and more – is in the hands of hackers linked to China, officials say. Continue reading
After hackers stole customer data from the Home Depot weeks ago, questions remain as to why retail stores haven’t been more successful at protecting their systems from cyber theft. For more on this, Mike Riley, a reporter with Bloomberg, joins Hari Sreenivasan in New York City. Continue reading
Starting on July 1, 2015, residents of California will be able to remotely wipe their cell phone data with the push of a button. Continue reading
The Department of Homeland Security says that more than 1,000 U.S. businesses have fallen victim to hacker malware that steals financial and personal information from customers after they swipe their credit cards. Continue reading
U.S. retailer Target has acknowledged that up to 110 million customer accounts were compromised by a data breach during the holidays, raising consumer concerns and prompting lawmakers to demand answers. How can shoppers protect themselves? Gwen Ifill talks to Nicole Perlroth of The New York Times and Ken Stasiak of SecureState. Continue reading