The World Wide Web’s inventor warns it’s in peril on 28th anniversary

Tim Berners-Lee, who invented the World Wide Web, now wants to save it.

The computer scientist who wrote the blueprint for what would become the World Wide Web 28 years ago today is alarmed at what has happened to it in the past year.

“Over the past 12 months, I’ve become increasingly worried about three new trends, which I believe we must tackle in order for the web to fulfill its true potential as a tool which serves all of humanity,” he said in a statement issued from London. He cited compromised personal data; fake news that he says has “spread like wildfire”; and the lack of regulation in political advertising, which he says threatens democracy.

Continue reading… “The World Wide Web’s inventor warns it’s in peril on 28th anniversary”

0

Hackers steal 5.6M fingerprint files: What can criminals do with the data?

fingerprint

Cybercriminals stealing our biometric information is very unsettling. Passwords, credit cards and even Social Security numbers can be changed to guard against identify theft and fraud. Fingerprints, however, cannot. At least, not permanently. Perhaps the only silver lining to the U.S. Office of Personnel Management’s announcement last week that criminals had stolen 5.6 million fingerprint files, up from the 1.1 million files originally reported missing, is that it would be extremely difficult to use such biometric data to commit fraud or theft.

Continue reading… “Hackers steal 5.6M fingerprint files: What can criminals do with the data?”

0

U.S. gas stations under attack by hackers

8542645125_f81a95ee4a_z

Trend Micro researchers Kyle Wilhoit and Stephen Hilt decided to take a closer look at gas station monitoring systems after one was hacked earlier this hear. They set up fake internet-connected systems called “GasPots” — honeypots that mimic the real ones — in several countries to track hackers’ movements.

 

Continue reading… “U.S. gas stations under attack by hackers”

0

Darkhotel tricks hotel Wi-Fi users into downloading malicious software

darkhotel

Business travelers beware of Darkhotel.

There are a lot of reasons not to use Wi-Fi in a hotel. It’s often expensive, sluggish, and unreliable. Sometimes it seems like nobody knows the network password, and when trouble arises it’s hard to convince the front desk that there’s a problem with their network, not one with your devices.

 

 

Continue reading… “Darkhotel tricks hotel Wi-Fi users into downloading malicious software”

0

Cyber Gym: Israeli hacking school that trains corporate cyber warriors

Trainees work in front of their computers at the “Cyber Gym” center.

Israel’s new state-of-the-art “Cyber Gym” is where IT and infrastructure company employees train to defend against cyber attacks. The facility is a series of small buildings in the shadow of the looming Orot Rabin power station on Israel’s northern coastline. It was inaugurated this month by the Israel Electric Corp (IEC), which has experienced its fair share of cyber attacks.

 

 

Continue reading… “Cyber Gym: Israeli hacking school that trains corporate cyber warriors”

0

Google Ideas announces new tools to access the internet from repressive countries

[youtube]http://www.youtube.com/watch?v=ZJ6BuHL0EiQ[/youtube]

The New York City–based “think/do tank,” Google Ideas, is run by the Internet search giant, Google, and they are launching several new technologies designed to highlight hacker attacks around the world and help people in repressive regimes access the Internet. The new products, announced this week at the Google Ideas Summit in New York City, represent the most substantial offerings delivered by the three-year-old Google policy unit and could be a major boon to activists and reformers in the world’s most closed and repressive societies.

 

 

Continue reading… “Google Ideas announces new tools to access the internet from repressive countries”

0

Why software developers are like artists

A team at MuleSoft created a video a few weeks ago describing what it’s like to be a developer at the company. James Donelan, VP of engineering at MuleSoft, noted in the video how developers are like artists. There are many reasons why there are similarities between developers and artists. These perceptions are based on observations in the workplace and personal experience, too.

Continue reading… “Why software developers are like artists”

0

China hackers are after U.S. military drone technology

This is the largest campaign we’ve seen that has been focused on drone technology.

Chines hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all, for nearly two years. Their target, according to an American cyber security company that monitored the attacks, was the technology behind the United States’ clear lead in military drones.

 

 

Continue reading… “China hackers are after U.S. military drone technology”

0

U.S. lures young web warriors with hacking games

High school students in Virginia competed in a digital defense simulation.

Arlan Jaska is in the eight grade and he has figured out ow to write a simple script that could switch his keyboard’s Caps Lock key on and off 6,000 times a minute.  He would slip his program onto his friends computers when they weren’t looking.  It was all fun and games until the program spread to his middle school.

 

 

Continue reading… “U.S. lures young web warriors with hacking games”

0

Why the internet is a surveillance state

Facebook even tracks non-Facebook users.

We are going to start with three data points.

One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.

 

 

Continue reading… “Why the internet is a surveillance state”

0