Features by Chester Wisniewski
Posted In: shipping, hacking
Fake radio signals can be used to make ships that don't exist appear on the tracking system.
Posted In: health care, ACA, Affordable Care Act, health exchanges, Obamacare, glitches
The new Affordable Care Act health exchanges go live Tuesday morning, but will the website function properly?
Posted In: Tech, cybersecurity, Target, U.S. Chamber of Commerce, Cyber Security Summit
The second annual Cyber Security Summit kicks off today -- and big business is invited to the party.
Posted In: nsa, Edward Snowden, encryption, internet security
New information about NSA surveillance activity emerges. Even encrypted data is vulnerable to its data mining.
Posted In: Syria Internet, syria, cnn, washington post, hacking, cybersecurity
The group supporting Bashar al-Assad hacked a service called Outbrain in order to target WaPo, CNN, and Time.
Posted In: cybersecurity, hacking, Cellphones, mobile
Nearly half a billion mobile phone SIM cards might be vunerable to hacking. The vulnerability was revealed by a security researcher in Germany.
Posted In: NSA leaks, nsa, Edward Snowden, Microsoft, PRISM
New documents, leaked by Edward Snowden and reported in The Guardian newspaper, show how the NSA got Microsoft to circumvent its own encryption to intercept Outlook and Skype communications.
Posted In: China, hacking, cybersecurity
U.S. officials gave American Internet providers information on suspected cyber spies in China as part of a secret program to defend against cyberespionage.
Posted In: apple, ios, hacking
A group of German researchers has found a security problem in Apple's Internet hotspots for mobile devices. Turns out, they can be easily hacked.
Posted In: health care, hospital, medical records
As hospitals become more automated, the dangers of computer viruses become more serious.