hacking

See the following -

China Has Repeatedly Hacked Veterans Affairs Databases Since 2010, Lawmaker Says

Bob Brewin | Nextgov | June 4, 2013

Since 2010, foreign actors have repeatedly compromised an unencrypted database maintained by the Veterans Affairs Department that contains personally identifiable information on roughly 20 million veterans, a House lawmaker said Tuesday. Read More »

Hack To Help The Philippines

Billy Mitchell | InTheCapital | November 15, 2013

The Philippines can take any help it can get right now, totally devastated last weekend by the typhoon that struck the island nation off the coast of Vietnam in the Pacific. While your immediate inclination may be to donate cash and be done with it – and no, this is not telling you not to donate – there are many other routes through which you can help the relief efforts. Saturday in D.C., one group will join together to help through hacking. Read More »

How Hackers Beat the NSA In The ’90s and Can Do It Again

Gregory Ferenstein | TechCrunch | June 28, 2013

While the world parses the ramifications of the National Security Agency’s massive snooping operation, it’s important to remember an earlier government attempt at data collection and, more important, how a group of hackers and activists banded together to stop it. Read More »

10 Reasons To Fear LinkedIn’s New Service

Bishop Fox | Salon | October 26, 2013

The business social media network wants to rout your email. The benefits to you are unclear... Read More »

2013 Open Hardware Summit

Jeremy Blum | JeremyBlum.com | October 7, 2013

After attending the annual Open Hardware Summit in both 2011 and 2012, I returned again this year to revel in the excitement that surrounds the open source hardware community. Every year, the summit continues to grow, with over 500 people attending this year’s summit. Held on the MIT campus, this year’s summit did not disappoint [...]. Read More »

36 Governments (Including Canada’s) Are Now Using Sophisticated Software To Spy On Their Citizens

Leo Mirani | Quartz | May 1, 2013

A new report from Citizen Lab, a Canadian research center, shows surveillance software sold by FinFisher, a “governmental IT intrusion” company owned by the UK-registered Gamma International, is now active in 36 countries. That’s up from the 25 countries reported two months ago. Read More »

8 Out of 10 Mobile Health Apps Open to HIPAA Violations, Hacking, Data Theft

Bill Siwicki | Healthcare IT News | January 13, 2016

A new report shows 84  percent of U.S. FDA-approved health apps tested by IT security vendor Arxan Technologies did not adequately address at least two of the Open Web Application Security Project top 10 risks. Most health apps are susceptible to code tampering and reverse-engineering, two of the most common hacking techniques, the report found. Ninety-five percent of the FDA-approved apps lack binary protection and have insufficient transport layer protection, leaving them open to hacks that could result in privacy violations, theft of personal health information, as well as device tampering and patient safety issues...

Read More »

8 Out of 10 Mobile Health Apps Open to HIPAA Violations, Hacking, Data Theft

Bill Siwicki | Healthcare IT News | January 13, 2016

A new report shows 84  percent of U.S. FDA-approved health apps tested by IT security vendor Arxan Technologies did not adequately address at least two of the Open Web Application Security Project top 10 risks. Most health apps are susceptible to code tampering and reverse-engineering, two of the most common hacking techniques, the report found. Ninety-five percent of the FDA-approved apps lack binary protection and have insufficient transport layer protection, leaving them open to hacks that could result in privacy violations, theft of personal health information, as well as device tampering and patient safety issues...

Read More »

A Deadly Equation Of Acronyms: NHS+IT=FUBAR

Nicholas H.Tollervey | ntoll.org | September 28, 2012

I've recently had the pleasure of taking part in two hacker events organised within the context of healthcare and, specifically, the UK's National Health Service.[...] To be clear (and more seriously), I am using the term "hacker" in the way it is used within Information Technology circles: a hacker is a person with a passion for exploring and solving problems through writing and sharing software. Read More »

After Stuxnet: The New Rules Of Cyberwar

Robert L. Mitchell | Computerworld | November 5, 2012

Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware. Read More »

Applications Now Open For 2014 OpenNews Fellowships

Erica | The Mozilla Blog | June 17, 2013

Today we’re proud to announce the start of the 2014 Knight-Mozilla OpenNews Fellow application process. Read More »

Carmen Ortiz And Stephen Heymann: Accountability For Prosecutorial Abuse

Glenn Greenwald | The Guardian | January 16, 2013

Imposing real consequences on these federal prosecutors in the Aaron Swartz case is vital for both justice and reform Read More »

China Isn’t Wrong To Call The U.S. "The Real Hacking Empire"

Lily Kuo | Nextgov | May 9, 2013

The cyberwar between China and the US has spread from computers into the halls of diplomacy. In a report this week, the Pentagon said for the first time that the Chinese government and military have been launching cyber attacks against the US. Today, Chinese state media called the US “the real hacking empire” and said the country has “an extensive espionage network.” Read More »

CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous

Mark M. Jaycox and Kurt Opsahl | Electronic Frontier Foundation | February 25, 2013

The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »

Coding Sub-Zero

Lis Evenstad | eHealth Insider | January 29, 2013

Despite a lack of heating and a rather unreliable internet connection, spirits were high at NHS Hack Day, Oxford. Lis Evenstad reports. Read More »