Tag Archives: Policy

After Trump tweets Defcon hacking video, voting security experts call BS

Getty Images reader comments 185 with 115 posters participating Share this story As President Trump continues to make unfounded claims of widespread election fraud, 59 of the world’s foremost experts on electronic voting are hitting back, saying that recent allegations of actual voting machine hacking “have been unsubstantiated or are technically incoherent.” Monday’s letter came… Read More »

US gov’s CISO takes leave to help Trump search for election fraud

Enlarge / These Trump allies are part of a group hunting for voter fraud. From left to right, Thomas Baptiste, Matthew Braynard, Camilo Sandoval, and Witold Chrabaszcz on November 14, 2020 in Vienna, Virginia. Getty Images | The Washington Post reader comments 288 with 119 posters participating Share this story The US government’s chief information… Read More »

Hackers sponsored by Russia and North Korea are targeting COVID-19 researchers

Enlarge (credit: Getty Images) Hackers sponsored by the Russian and North Korean governments have been targeting companies directly involved in researching vaccines and treatments for COVID-19, and in some cases, the attacks have succeeded, Microsoft said on Friday. In all, there are seven prominent companies that have been targeted, Microsoft Corporate VP for Customer Security… Read More »

Broadband power users explode, making data caps more profitable for ISPs

Data cap cash. reader comments 275 with 129 posters participating Share this story The number of broadband “power users”—people who use 1TB or more per month—has doubled over the past year, ensuring that ISPs will be able to make more money from data caps. In Q3 2020, 8.8 percent of broadband subscribers used at least… Read More »

SITREP: Azerbaijan’s drone war expands with Reaper-like TB2

reader comments 201 with 125 posters participating, including story author Share this story The renewed war between Azerbaijan and Armenia over the Nagoro-Karabakh region has captured the attention of military strategists worldwide, including the United States, because of the degree to which drones have changed the battlefield. While the wide-open, rugged terrain of the region… Read More »

Ajit Pai urged to accept Trump loss and stop controversial rulemakings

Enlarge / From left to right, Federal Communication Commission Chairman Ajit Pai and commissioners Michael O’Rielly, Brendan Carr, Jessica Rosenworcel, and Geoffrey Starks testify before the House Communications and Technology Subcommittee on December 05, 2019 in Washington, DC. Getty Images | Chip Somodevilla reader comments 173 with 100 posters participating Share this story Congressional Democrats… Read More »

Advisories: “Brazen” Russian ransomware hackers target hundreds of US hospitals

Getty Images reader comments 51 with 42 posters participating Share this story Russian hackers are targeting hundreds of US hospitals and healthcare providers just as the coronavirus is making a comeback and the US presidential election is in its final stretch, officials from three government agencies and the private sector are warning. The hackers typically… Read More »

Trump’s website defaced with claim that Trump admin created coronavirus

Enlarge / President Trump’s campaign website during its brief defacement. reader comments 101 with 73 posters participating Share this story President Trump’s website last night was briefly defaced by hackers who pitched a cryptocurrency scam and claimed that Trump has “criminal involvement” with election manipulation and that his administration was involved in creating the coronavirus.… Read More »

Study shows which messengers leak your data, drain your battery, and more

reader comments 62 with 43 posters participating Share this story Link previews are a ubiquitous feature found in just about every chat and messaging app, and with good reason. They make online conversations easier by providing images and text associated with the file that’s being linked. Unfortunately, they can also leak our sensitive data, consume… Read More »