Tracks on Flipboard

By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.

These hackers warned the Internet would become a security disaster. Nobody listened. | The Washington Post

Published on June 22, 2015

The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank. No, Space Rogue, Kingpin, Mudge and the others were hackers who had come from the mysterious environs of cyberspace to …


Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth

Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to


I Spoke Up Against Sexist Remarks On Facebook; What Followed Was Worse

I am a strong independent woman who has been fortunate to have a privileged upbringing. One would assume, I live a more secure life. Yet, I have …

10 Mind-Reading Tech Projects That Might Freak You Out

Our gadgets know where we are and what we've been doing. But our thoughts are safe. Right?

Technology that reads your mind seems like a dream. Or a …

Six easy ways to ensure your cyber security

Anyone with a computer has probably been a victim of a phishing attempt, where hackers pose as a trustworthy entity and try to get your username, …


Trolls for hire: Why are Russians being paid to wreak havoc online?

Journalist Adrian Chen joins Shad to discuss his reporting on an alleged "pro-Kremlin troll farm" in St. Petersburg.


Reality Intrudes

Why The OPM Breach Is Such a Security and Privacy Debacle

If it’s not already a maxim, it should be: Every big hack discovered will eventually prove to be more serious than first believed. That’s holding to …

The Hacking of Federal Data Is Much Worse Than It First Seemed

Cyber-attacks linked to China appear to have resulted in the theft of security-clearance records with sensitive data about millions of American military and intelligence personnel.

To truly understand just how rigorous and intrusive the process to get security clearance for the federal government …


Why China wants as much personal data from US government servers as possible

An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory in Idaho Falls, Idaho September 29, 2011.

China is building a massive database of Americans' personal information as part of an evolving cyber-espionage operation targeting US government …


6 Cheap Ways to Ensure Your Cyber Security

Anyone with a computer has probably been a victim of a phishing attempt, where hackers pose as a trustworthy entity and try to get your username, …


Great album cover by Matt Mahurin...

China hackers got past costly U.S. computer security with ease

The hackers who stole personal data on 4 million government employees from the U.S. Office of Personnel Management sneaked past a sophisticated …

How Companies Turn Your Facebook Activity Into a Credit Score

Nicole Keplinger, 22, had long seen ads on Facebook promising financial relief, but she always ignored them and assumed that they were scams. …


Google unveils Project Soli, a radar-based wearable to control anything

Leading into Google I/O, one session caught everyone’s attention. Google ATAP — the company’s skunkworks division tasked with creating cool new things we’ll all actually use — teased their session with talk of a new wearable that would “literally” blow our socks off.

Project Soli is that wearable, …


Chill Out, America


How Facebook knows who all your friends are, even better than you do

The mystery of how Facebook finds people you may know has baffled users for years. Photo: Bloomberg

Last week, a Redditor named easyjet decided to …


Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism - Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource - Knoke

, , & (2011). Terrorism experiments. Journal of Peace Research, 48, 373–382. doi:10.1177/0022343310391502

, , & (2012). A dimensional approach to …

Inside NSA, Officials Privately Criticize “Collect It All” Surveillance

AS MEMBERS OF CONGRESS struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the …


Tracking Human Mobility using WiFi signals

When I started working on understanding social systems, privacy really wasn’t on my mind. (I generally want to write down equations, understand the …


IRS system mined for over 100,000 taxpayer records by fraudsters [Updated]

In an official statement issued today, the IRS announced that it has shut down an online service to obtain tax records after determining that …

Internal Revenue Service

Americans Consider Certain Kinds of Data to be More Sensitive than Others

Different kinds of information evoke varying levels of sensitivity among Americans. Social security numbers are universally considered to be the most …


NSA is so overwhelmed with data, it's no longer effective, says whistleblower

NEW YORK -- A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's …

NSA Phone Record Program Illegal, Appeals Court Finds

A federal appeals court in New York ruled Thursday the National Security Agency’s dragnet collection of U.S. phone records is illegal in a decision …

A cybercrime wave is coming – brace yourself

Your new book is called Future Crimes. How is crime changing?
In the old days, you buy a gun or a knife, you go hide in a dark alley until some sucker …


Jeb Bush loves Obama('s NSA surveillance)

Who says bipartisanship is dead?

Jeb Bush's appeared on Michael Medved’s conservative talk radio to praise Obama's massive expansion of GWB's domestic surveillance program, and had some genuinely insightful things to say about how Obama is helping to destroy the fundamentals of democracy while …


Hacked Sony emails reveal that Sony had pirated books about hacking

Sony doesn't like pirates—except, perhaps, when Sony feels like pirating.

Hacked Sony Pictures Entertainment emails, published in full on Thursday by …