Support Marketplace
READ MORE

Features by Chester Wisniewski

Hackers find vulnerability in system that tracks shipping vessels

Fake radio signals can be used to make ships that don't exist appear on the tracking system.
Posted In: shipping, hacking

It may be smart to wait a while before you sign up for the new health care plan

The new Affordable Care Act health exchanges go live Tuesday morning, but will the website function properly?
Posted In: health care, ACA, Affordable Care Act, health exchanges, Obamacare, glitches

The Chamber of Commerce gets into...cyber security?

The second annual Cyber Security Summit kicks off today -- and big business is invited to the party.
Posted In: Tech, cybersecurity, Target, U.S. Chamber of Commerce, Cyber Security Summit

NSA working to undermine the last ten years of encryption

New information about NSA surveillance activity emerges. Even encrypted data is vulnerable to its data mining.
Posted In: nsa, Edward Snowden, encryption, internet security

Syrian Electronic Army hacked U.S. media companies using Outbrain

The group supporting Bashar al-Assad hacked a service called Outbrain in order to target WaPo, CNN, and Time.
Posted In: Syria Internet, syria, cnn, washington post, hacking, cybersecurity

How to protect your cellphone from hackers

Nearly half a billion mobile phone SIM cards might be vunerable to hacking. The vulnerability was revealed by a security researcher in Germany.
Posted In: cybersecurity, hacking, Cellphones, mobile

Encryption works? Microsoft helps NSA break through its own data protections

New documents, leaked by Edward Snowden and reported in The Guardian newspaper, show how the NSA got Microsoft to circumvent its own encryption to intercept Outlook and Skype communications.
Posted In: NSA leaks, nsa, Edward Snowden, Microsoft, PRISM

Government working with tech companies to find Chinese hackers

U.S. officials gave American Internet providers information on suspected cyber spies in China as part of a secret program to defend against cyberespionage.
Posted In: China, hacking, cybersecurity

Default iOS hotspot passwords hacked in less than a minute

A group of German researchers has found a security problem in Apple's Internet hotspots for mobile devices. Turns out, they can be easily hacked.
Posted In: apple, ios, hacking

Forget the patient, what happens when the medical hardware gets a virus?

As hospitals become more automated, the dangers of computer viruses become more serious.
Posted In: health care, hospital, medical records

Pages