Tracks

By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.

The (not so) secret life of a networked and networking scholar

[Image credit: https://pixabay.com/static/uploads/photo/2016/05/01/20/12/swing-1365713_960_720.jpg ]<p>Not a day passes or there is not another blog or …

Networking

Trump Campaign Says Donald Would Loosen Civil Service Laws to Root Out Feds Loyal to Obama

A key Donald Trump ally unveiled this week how the Republican nominee would reform the civil service as president, and it could dramatically change …

Donald Trump

Bill Rand Analyzes Facebook, Twitter Initiatives to Expand Marketing Capabilities

Hello, I am Riad Khan. I am full time online marketer and also chief trainer of "Best IT Center". Here is my personal information below.... …

Twitter

How technology disrupted the truth

One Monday morning last September, Britain woke to a depraved news story. The prime minister, David Cameron, had committed an “obscene act with a dead pig’s head”, according to the Daily Mail. “A distinguished Oxford contemporary claims Cameron once took part in an outrageous initiation ceremony at …

Journalism

Nuclear weapons contractors repeatedly stifle whistleblowers, auditors say

At laboratories and factories where American nuclear weapons are designed and built, and at the sites still being cleansed of the toxic wastes …

Nuclear weapons

Information Warfare Initiative.

Information Warfare Initiative<p>10 July 2016<p>03 July 2016<p>27 June 2016<p>10 July 2016<p>10 July 2016<p>03 July 2016<p>20 June 2016<p>18 May 2016<p>06 May 2016<p>11 May 2016<p>10 …

War

From Snowden to Panama, all hail the power of the press

Fifa corruption, Snowden and surveillance, Rotherham child abuse, drugged athletes, Stephen Lawrence, WikiLeaks, MPs’ expenses, phone hacking, HSBC, cash for questions, cricket fixing, extraordinary rendition, Olympic bribery, Slater Walker share fixing, DC-10 crashes, thalidomide, corruption at …

Corruption

Who Will Own Your Data If the Tech Bubble Bursts?

Corporations, data brokers, and even criminals might buy failed companies just for their users’ personal information.<p>Imagine that Silicon Valley’s nightmare comes true: The bubble bursts. Unicorns fall to their knees. The tech giants that once fought to attract talented developers with mini-golf …

Fortune 500

Netflix says Geography, Age, and Gender are “Garbage” for Predicting Taste

Big Data is making broad categories irrelevant for targeting consumers.<p>Netflix rolled out to 130 new countries earlier this year, and you might expect that it began carefully tailoring its offerings for each of them, or at least for various regions. But as a new <i>Wired</i> feature reveals, that couldn’t …

Netflix

Watch "Ending up on the wrong side of the tracks: Valdis Krebs at TEDxRiga" Video at TEDxTalks

MIT's digital lookout in the crows nest of cyber warfare

Two researchers built an artificial intelligence that's designed to evolve into the ultimate cyber defense.<p>"Think about the system as a virtual analyst," says Kaylan Veermachaneni, co-creator of MIT's latest artificial intelligence. He's a research scientist at the university's Computer Science and …

Intelligence

FBI paid professional hackers one-time fee to crack San Bernardino iPhone

The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.<p>The new information was then used to create a piece of hardware that helped …

iPhone

Apple’s Penchant for Consumer Security

At a security “deep dive” at Apple on Friday, executives went into depth on Apple security philosophy and technological approach to the matter. I’ve …

Security

This Wearable of the Future Will Track Your Carbon Footprint

Benjamin Hubert spends his time imagining a greener future—and trying to create the environmentally friendly technologies to go along with it. Most …

Carbon

Speed is Key to Threat Intelligence Sharing at Every Level

Speed and communication are key elements to effective threat intelligence in the government, according to panelists at the Akamai Government Forum on …

Intelligence

Matthew Collings – A Requiem for Edward Snowden

A <i>Requiem</i><i></i> is usually written ‘<i>for the repose of the soul or souls of one or more deceased persons</i>‘, but the term ‘<i>has subsequently been applied to</i> …

Edward Snowden

Journalists will not share Panama Papers with Justice Department

The media group that coordinated the Panama Papers investigation into offshore companies said on Thursday it would not participate in a criminal probe by the U.S. Department of Justice.<p>Preet Bharara, the U.S. Attorney for Manhattan, wrote to the International Consortium of Investigative Journalists …

Latin America

Anna Porter: Punishing Russia’s murderous kleptocrats

Chloe Cushman/National PostBill Browder is a marked man. It’s hard to think of him in that context when visiting his modern offices in London, but it …

Russia

Tracing the path of four terrorists sent to Europe by the Islamic State

SALZBURG, Austria — On a crisp morning last October, 198 migrants arrived on the Greek island of Leros, all of them seemingly desperate people seeking sanctuary in Europe. But hiding among them were four men with a very different agenda.<p>The four were posing as war-weary Syrians — all carrying …

Europe

Hollywood hospital held to ransom by hackers

<b>Ransomware is a growing menace for computer users - but when a hospital is targeted, it makes the disruption far more serious.</b><p>Computer systems at …

Hospitals

Vote all you want. The secret government won’t change.

The voters who put Barack Obama in office expected some big changes. From the NSA’s warrantless wiretapping to Guantanamo Bay to the Patriot Act, …

Government

recode_divider

CNBC<p>Google acknowledges it collects information about students when they’re visiting Google-owned sites such as YouTube or services like Google Maps — but says it doesn’t use this personal data to target advertising.<p>The company provided details of its privacy practices in response to an inquiry …

Alex Gibney

EFF to Support Apple in Encryption Battle

We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of …

Encryption

If Apple loses to the FBI, we're all screwed

Forget the technology. If the FBI successfully forces Apple to create a new OS just to brute-force hack its own product, it’s the first step through a very dark one-way door — for all of us.<p>In case you haven’t heard, the FBI has in its possession an Apple iPhone 5C that was used by one of the …

Security

Netflix knows exactly how long it has before it loses you

Netflix knows it has only seconds before it could lose you.<p>Researchers at the company have found that if a typical subscriber doesn't find something to watch in about 60 or 90 seconds, they could lose interest and move on to something else, like a video game, a book, or even old-fashioned TV.<p>"The …

Netflix

Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On

The case has polarized the nation—and also generated misinformation. WIRED's here to separate the facts from the non-facts. The post Apple's FBI …

FBI

Why Apple Is Right to Challenge an Order to Help the F.B.I.

It is understandable that federal investigators want to unlock an iPhone used by one of the attackers who killed 14 people in San Bernardino, Calif., in December. And it’s understandable that the government would turn to Apple for help. But Apple is doing the right thing in challenging the federal …

Apple Says the Government Bungled Its Chance to Get That iPhone’s Data

A San Bernardino county worker may be responsible for a contentious battle now playing out between Apple and the government over data on an iPhone. …

iPhone

If we want a resilient world, we need to start with resilient data

<i>Editor’s note: This Voices piece is published in collaboration with the academic journal Elementa. It is based on “Toward a digital resilience,” a</i> …

Maps