Hackers And Net Security
Thursday, February 20, 2014
Tinder is a dating app that allows users to search for potential matches based on proximity. There's been a lot of talk of the app's popularity with Olympic athletes, which the media seems to be eating up. Yesterday, some security researchers published an article saying that they had figured out how to use Tinder to get users' exact locations.
Friday, January 24, 2014
Yesterday, revenge porn pioneer and all around gross dude Hunter Moore was indicted by the United States District Court for the Central District of California. But even though California has revenge porn statutes on the books, the bulk of the charges were made under what is known as the Computer Fraud and Abuse Act, or, more colloquially, The Hacker Law.
Friday, August 02, 2013
Journalist Brian Krebs has been writing about computer security for years, much to the chagrin of the online fraudsters and identity thieves he reports upon. He often finds himself on the receiving end of online attacks from these criminals, but last month, they hatched a much more elaborate plan. Brooke speaks to Krebs about being harassed by Russian cyber criminals.
Shigeto - Ringleader
Friday, February 15, 2013
This week, President Obama issued an executive order to strengthen the nation's cyber security against what the government sees as a potentially cataclysmic threat. There has been plenty of drum beating about the threat of cyber warfare, but just how realistic is the threat of an attack that could wreak havoc on our national infrastructure? In a story from August of 2012, On the Media producer Alex Goldman investigates.
Jun Miyake - Lillies of the Valley
Friday, August 10, 2012
In the space of just a few hours, hackers managed to remotely delete Wired reporter Mat Honan's iPad, iPhone, even the hard drive on his computer. Brooke talks to Mat about the surprisingly simple means by which the hackers were able to devastate his online life.
Friday, April 13, 2012
The past year we've heard stories about hacking, from The News of the World scandal to the exploits of groups like Anonymous and Lulzsec. But the way the media uses the word 'hack' diverges sharply from the way it's used by actual hackers. On the Media Producer Alex Goldman explores the history of the word and how its meaning has shifted over time in a story that originally aired in September of 2011.
Friday, January 13, 2012
Hackers frequently release insecure information to demonstrate the vulnerability of new technologies. It's a novel approach, but certainly not new. Bob talks to New Scientist's Paul Marks, who tells the story of Nevil Maskelyne, and magician and inventor who, in the interest of exposing the technology's insecurity, hacked Guglielmo Marconi's first demonstration of the wireless telegraph.
Friday, September 23, 2011
Passed in 1986, the Computer Fraud and Abuse Act was specifically meant to target hacking. But in recent years it's been used to prosecute a much wider swath of behavior, some of which has nothing to do with hacking. Marcia Hofmann of the Electronic Frontier Foundation talks to Brooke about the perils of having such a vague law on the books.
Friday, September 23, 2011
This year we've heard stories about hacking, from The News of the World scandal to the exploits of groups like Anonymous and Lulzsec. But the way the media uses the word hack diverges sharply from the way it's used by actual hackers. On the Media Producer Alex Goldman explores the history of the word and how its meaning has shifted over time.
Friday, June 17, 2011
Internet technologist Bruce Schneier argues that there's been no epidemic of hacking in the last few months, only an epidemic of hacking coverage. The media have gone looking for a pattern, he says, in just the same way they do with shark attacks every summer and are distracting us from the real issues of cyber-security.