Though prosecutors do have existing tools and have brought international cybertheft cases in the past year, the Justice Department says a new law is needed at a time when criminals operating largely in Eastern Europe are able to gobble up millions of stolen credit card numbers and commit widespread fraud in a matter of mouse clicks. Companies and banks, too, have been stung by faraway hackers who have siphoned away personal information. Continue reading
As online hacking becomes more common, interest in the individuals and groups behind such cyber attacks rises. Hari Sreenivasan speaks with David Kushner of The New Yorker on the origins of one of the most infamous hacking groups, “Anonymous.” Continue reading
A slew of intimate celebrity photos have surfaced this week after several celebrities’ personal online storage accounts were hacked. Though it is not clear who hacked the accounts or posted them, Apple said that the breach on its iCloud server was “very targeted.” Judy Woodruff talks to Dmitri Alperovitch of CrowdStrike and Sean Gallagher of Ars Technica. Continue reading
John Matherly, founder of internet search engine Shodan, created a map that shows the location of internet-connected devices across the globe.
In the wake of Edward Snowden’s revelations about the NSA collecting massive amounts of user meta-data, many people went in search of safer, more secure ways to use the internet anonymously. Once thought to be something only used by the tech-savvy, increased interest in end-to-end e-mail encryption has prompted both Google and Yahoo to develop user-friendly versions of the protocol that would, in theory, make personal messages exceedingly difficult to intercept. Continue reading
The official says the estimate of Homeland Security workers affected by the breach at USIS may rise further. The official spoke on condition of anonymity in order to discuss details of an incident that is under active federal criminal investigation. Homeland Security will soon begin notifying employees whose files were compromised and urge them to monitor their financial accounts, the official said. Continue reading
The problem? The global routing table has just grown past the 512k mark by about 15,000, causing widespread network instability. Verizon is primarily responsible for the creation of the new entries that pushed the net over the edge, but in fact, the problem is not as serious as it sounds. IT analysts have been anticipating “512k Day” since the mid-1980s, and Cisco addressed its inevitability mid-May of this year. Continue reading
By choosing to “like” or “follow” specific stories, pages and users, we paint a picture for sites like Google and Facebook of our interests, preferences and worldview. These sites’ algorithms then set to work ensuring we are shown more of the same. Continue reading