By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.
SAN FRANCISCO — Over the last four years, foreign hackers have stolen source code and blueprints to the oil and water pipelines and power grid of the United States and have infiltrated the Department of Energy’s networks 150 times.
So what’s stopping them from shutting us down?
The phrase …Homeland Security
The cascade of reports following the June 2013 government surveillance revelations by NSA contractor Edward Snowden have brought new attention to …Privacy
Forget satellite navigation – the US Navy is reinstating classes on the centuries-old practice of celestial navigation after realising that if GPS systems are hacked, they need a back-up plan.
For centuries, our ancestors relied on angular measurements taken from between a celestial body – such as …U.S. Navy
Russia is currently busy rewriting the country’s doctrine of information security, to be adopted in 2016. The internet is defined in the text as a major challenge to the political stability of the regime.
"Special services” and Western countries’ "controlled NGOs" actively use information and …Russia
As Benjamin Shayne settled into his back yard to listen to the Orioles game on the radio Saturday night, he noticed a small plane looping low and tight over West Baltimore — almost exactly above where rioting had erupted several days earlier, in the aftermath of the death of a black man, Freddie …Surveillance
In honor of National Cyber Security Awareness Month, here’s one more thing to worry about: airplane tickets. Earlier this week, Brian Krebs reported …Airplanes
The country’s genetic biobank is still in its earliest stages, but the government hopes to one day have enough donors to totally overhaul its health-care system.
When Steven Smit opens the freezer, liquid nitrogen pours into the room, cascading dramatically over the sides of the container before …Genetics
Plenty of email systems claim to be highly secure. The newest of them, ProtonMail, attracted widespread attention after the main character on the hit …Security
Get ready for television ads that feel a lot more personal.The post The Tech That Got Obama Elected Will Now Fire Ads at You appeared first on WIRED.Advertising
A data breach at credit bureau Experian may have exposed data from T-Mobile USA on about 15 million U.S. consumers.
The data includes names, birth …
If you type “money” into a Google image search, you get pictures of metal coins and paper notes. People fixate upon this physical currency, but while we still use such transferable tokens for many small transactions, large ones are inevitably electronic. When Rolls-Royce acquires metal to produce …Money
Fortune has a three-part article on the Sony attack by North Korea. There's not a lot of tech here; it's mostly about Sony's internal politics …Security
The threat of Chinese espionage is changing how the United States acts -- in ways big and small. For the first time in decades, the American president isn’t staying at the Waldorf Astoria, the luxury hotel on Park Avenue, during his annual trip to New York for a meeting of the United Nations.
Google will soon let advertisers tap into one of the most lucrative types of ad targeting: email addresses. The search giant is rolling out a new tool called Customer Match, which lets advertisers use a list of email addresses to target specific users across Google services. To be targeted through …Google
To hear FBI Director James Comey tell it, strong encryption stops law enforcement dead in its tracks by letting terrorists, kidnappers and rapists …Security
Where is the internet? This map might explain it better than any statistics could ever hope to: The red hot spots show where the most devices that …Internet
This week's news in the encryption debates drives home the point that FBI Director James Comey could learn a thing or two from Mick Jagger. Mick reminded us that "You can't always get what you want, but if you try sometimes, you just might find, you get what you need."
What Comey wants is to put a …FBI
If press reports are accurate, it is a welcome development that the United States and China (in response to the threat of sanctions) have begun …
The concept of ‘self-tracking’ (also referred to as life-logging, the quantified self, personal analytics and personal informatics) has recently …
Predictive analytics and being “data driven” are kissing cousin topics that are being espoused at a conference near you this very second - assuming …
Sociologist Deborah Lupton says the growing use of health tracking technology is conditioning society to reveal more personal information about …Privacy
THE KEY PARAGRAPH in Andrei Soldatov and Irina Borogan’s new book, The Red Web, comes surprisingly late, after the authors have described the long and …Russia
In blunder threatening Windows users, D-Link publishes code-signing key
[Via Ars Technica]
In a ham-fisted move that threatens computer users …Encryption
The controversy over Hillary Clinton’s use of a private e-mail account while she was secretary of state has centered on whether she used it to send or receive classified messages. This focus obscures the larger question of whether Clinton’s setup affected the State Department’s compliance with the …National Security
A study released by a forensic consultancy has singled out the top five vehicles most susceptible to hacking.
The results of the study, by PT&C|LWG …
Do you always follow your doctor's orders? What if your doctor, pharmacist, health insurance company or even employer could tell if you were taking your heart medication when you were supposed to? How about your HIV medicine?
Would you look forward to a call from your pharmacy or the health benefits …Medicine
A couple of decades ago, a class of psychology undergraduates played a mean trick on their lecturer. The students on the right side of the room gently nodded, smiled, and looked thoughtful, while those on the left seemed bored and glum. Before long, the unsuspecting lecturer was addressing the …Scientific Research
Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.