hacking

See the following -

Computer Viruses Are "Rampant" On Medical Devices In Hospitals

David Talbot | MIT Technology Review | October 17, 2012

A meeting of government officials reveals that medical equipment is becoming riddled with malware. Read More »

Darrell Issa Probing Prosecution Of Aaron Swartz, Internet Pioneer Who Killed Himself

Ryan J. Reilly, Ryan Grim, Zach Carter | Huffington Post | January 15, 2013

House Oversight Committee Chairman Darrell Issa (R-Calif.) is investigating the Justice Department's prosecution of Aaron Swartz, the Internet activist who committed suicide on Friday after fighting felony hacking charges for two years. [...] Read More »

Download Hosts Withdrawing

Simon Phipps | Computerworld | June 21, 2013

Fewer and fewer services offer open source projects the ability to host downloads of their binaries. Should we be worried? Read More »

Epic Hacker Projects Compete For A Trip To Space

Eric Mack | CNET | July 2, 2014

A prize for hackers seeks the next transformative piece of open-source hardware. Its grand prize? Out of this world...

Read More »

Evaluating the Harm from Closed-Source Healthcare Software

Ben Collier | Radical Data | June 10, 2012

In a fantastic article on his blog at http://esr.ibiblio.org/, Eric S. Raymond, author of "The Cathedral and The Bazaar" goes to some lengths to quantify the damages and costs of using closed-source software in an organisation.

Read More »

Feds Go Overboard In Prosecuting Information Activist

Timothy B. Lee | Ars Technica | September 20, 2012

Violate website terms of use and you too could be a felon. Read More »

Google Cookies Are Pretty Mundane. So Why Do Spy Agencies Want Them?

Serdar Yegulalp | InfoWorld | December 12, 2013

Google cookies used by the NSA aren't much different from typical Web cookies, but when paired with other info, they can help home in on a particular user Read More »

GSA Seeks Governmentwide Mobile Device Management Contracts

Joseph Marks | Nextgov | February 8, 2013

The General Services Administration is seeking governmentwide contracts with vendors who can ensure the security of federal employees’ smartphones and tablets and the applications that run on them, solicitation documents show. Read More »

Hack the Programme

Staff Writer | EHealth Insider | May 28, 2012

The geeks shall inherit the world of NHS IT. Or that was the hope of NHS Hack Day 2012. Chris Thorne spent a day with the coders, and found that even the 'old guard' and 'big wigs' were having fun. Read More »

Hacker Uses an Android To Remotely Attack And Hijack An Airplane

Darlene Storm | Computerworld | April 10, 2013

The Hack in the Box (#HITB2013AMS) security conference in Amsterdam has a very interesting lineup of talks [pdf]. One that jumped out was the Aircraft Hacking: Practical Aero Series presented by Hugo Teso, a security consultant at n.runs in Germany... Read More »

Hackers Execute Sophisticated Strike On Government Cybersecurity Contractor Bit9

Aliya Sternstein | Nextgov | February 11, 2013

Unprotected computers at a cybersecurity contractor that services the Defense Information Systems Agency and many other federal agencies were compromised in a way that enabled the company's product to run viruses on customer networks. Read More »

Handover System Wins NHS Hack Day

Chris Thorne | EHealth Insider | May 28, 2012

The NHS Hack Day 2012 was won by a group of clinicians and developers who produced an electronic patient task-list for doctors in just 24 hours. Read More »

Happy 15th Birthday, OSCON

Press Release | O'Reilly | December 17, 2012

Now in its 15th year, OSCON has shown that open source software is the standard for everyday programming languages, databases, utilities, and operating systems. At OSCON 2013, we'll celebrate the open source success story and its ongoing revolution. What can you contribute to this year's program? Read More »

Health Records Of Every NHS Patient To Be Shared In Vast Database

Sarah Knapton | The Telegraph | January 10, 2014

The health records of everyone in the NHS will be pooled in a vast database which can be accessed by researchers and pharmaceutical companies. But campaigners warn it could breach privacy. Read More »

Healthcare.gov Sends User Information To Third Parties, Violating Its Own Privacy Policy

Adrianne Jeffries | The Verge | October 31, 2013

Here's more evidence of cutting corners during the development of the Healthcare.gov insurance marketplace: the website appears to be violating its own privacy policy by sending private user information to third parties. Read More »