Sep 03 Watch The roots of ‘Anonymous,’ the infamous online hacking community By PBS News Hour As online hacking becomes more common, interest in the individuals and groups behind such cyber attacks rises. Hari Sreenivasan speaks with David Kushner of The New Yorker on the origins of one of the most infamous hacking groups, “Anonymous.”… Continue watching
Sep 02 Watch Could the celebrity photo hack happen to you? By PBS News Hour A slew of intimate celebrity photos have surfaced this week after several celebrities’ personal online storage accounts were hacked. Though it is not clear who hacked the accounts or posted them, Apple said that the breach on its iCloud server… Continue watching
Sep 02 A map of every device connected to the internet on the planet By Anna Christiansen John Matherly, founder of internet search engine Shodan, created a map that shows the location of internet-connected devices across the globe. Continue reading
Aug 22 As governments invade privacy, tools for encryption grow more popular By Charles Pulliam-Moore In the wake of Edward Snowden’s revelations about the NSA collecting massive amounts of user meta-data, many people went in search of safer, more secure ways to use the internet anonymously. Once thought to be something only used by the… Continue reading
Aug 22 Up to 25,000 Homeland Security staff have personal data stolen By Stephen Braun, Associated Press The official says the estimate of Homeland Security workers affected by the breach at USIS may rise further. The official spoke on condition of anonymity in order to discuss details of an incident that is under active federal criminal investigation. Continue reading
Aug 15 The internet is getting too big for its routers By Charles Pulliam-Moore The problem? The global routing table has just grown past the 512k mark by about 15,000, causing widespread network instability. Verizon is primarily responsible for the creation of the new entries that pushed the net over the edge, but in… Continue reading
Aug 07 Twitter Chat: Who controls our perception of current events? By Nora Daly By choosing to “like” or “follow” specific stories, pages and users, we paint a picture for sites like Google and Facebook of our interests, preferences and worldview. These sites’ algorithms then set to work ensuring we are shown more of… Continue reading
Aug 07 Google search will reward encrypted sites By Colleen Shalby In an effort to make the Internet a safer place, Google will prioritize secure websites in search results, giving a boost to those URLs with an "https" -- "s" as in "secure" -- over "http."… Continue reading
Jul 10 Twitter Chat: Trust and the Sharing Economy By Nora Daly On your next vacation you could sleep in a stranger’s house, ride in a different stranger’s car, and do it all while a person you’ve never met watches your dog. Continue reading
May 19 Justice Department announces charges against Chinese cyberspies By Eric Tucker, Associated Press The indictments will accuse individuals of participating in cyber-espionage on behalf of a foreign government, said the official, who revealed this information only on grounds of anonymity because this person wasn't authorized to publicly discuss the case in advance of… Continue reading