January 2013

31 January, 2013

OVERNIGHT TECH: Wyden wants hearing on hacking law in wake of Swartz’s … – The Hill (blog)

OVERNIGHT TECH: Wyden wants hearing on hacking law in wake of Swartz's
The Hill (blog)
THE LEDE: Sen. Ron Wyden (D-Ore.) said he's engaged in talks with members on both sides of the aisle about how they can update an anti-hacking law that was used to press charges against Internet activist Aaron Swartz, who committed suicide this month.

Source: hacking – Google News

Filed under Blog by

US newspapers report Chinese hacking attack – KEYT


KEYT
US newspapers report Chinese hacking attack
KEYT
Print; Email. Tweet. New York Times. HONG KONG (CNN) -. The New York Times says Chinese hackers have carried out sustained attacks on its computer systems, breaking in and stealing the passwords of high-profile reporters and other staff members.

Source: hacking – Google News

Filed under Blog by

Chinese Hackers’ Attack on the New York Times Worked to Perfection – Slate Magazine


Slate Magazine
Chinese Hackers' Attack on the New York Times Worked to Perfection
Slate Magazine
Journalists are on notice. If you investigate the Chinese government, Chinese hackers will come after you. That's what you should conclude from the New York Times' disclosure that it was hacked for four months by attackers it suspects were associated

Source: hacking – Google News

Filed under Blog by

Chinese Hackers Have Also Been Hacking The Wall Street Journal – Gizmodo

Chinese Hackers Have Also Been Hacking The Wall Street Journal
Gizmodo
Chinese Hackers Have Also Been Hacking The Wall Street Journal Not to be left out in the old boys club of the Great Chinese Hacking Scandal of 2013, the Wall Street Journal included themselves with the New York Times as being hacked by Chinese

Source: hacking – Google News

Filed under Blog by

US newspapers report Chinese hacking attack – Local 10


Local 10
US newspapers report Chinese hacking attack
Local 10
The New York Times says Chinese hackers have carried out sustained attacks on its computer systems, breaking in and stealing the passwords of high-profile reporters and other staff members. According to The Times, one of the biggest and most respected

Source: hacking – Google News

Filed under Blog by

Wall Street Journal, New York Times Hacking Highlights China’s Resistance To … – Huffington Post

Wall Street Journal, New York Times Hacking Highlights China's Resistance To
Huffington Post
NEW YORK — Last October, just a few hours after The New York Times revealed that the family of prime minister Wen Jiabao had quietly accumulated a multibillion-dollar fortune, the Chinese government blocked access to English- and Chinese-language

Source: hacking – Google News

Filed under Blog by

Chinese hacking of US media becoming a “widespread phenomenon” – Ars Technica

Chinese hacking of US media becoming a “widespread phenomenon”
Ars Technica
Computer systems operated by The Wall Street Journal have been penetrated by Chinese hackers for the apparent purpose of monitoring the publication's coverage of China, the newspaper reported Thursday. The acknowledgement came in a short article

Source: hacking – Google News

Filed under Blog by

What the New York Times hack tells us about the layer cake of hacking – The Guardian


The Guardian
What the New York Times hack tells us about the layer cake of hacking
The Guardian
And: universities and other academic locations are prime stepping stones for hackers looking to get into bigger, better protected systems: the Chinese hackers used systems at the universities of North Carolina, Arizona, Wisconsin and Nex Mexico, as

Source: hacking – Google News

Filed under Blog by

US newspapers report Chinese hacking attack – WDSU New Orleans


WDSU New Orleans
US newspapers report Chinese hacking attack
WDSU New Orleans
New York Times. The New York Times says Chinese hackers have carried out sustained attacks on its computer systems, breaking in and stealing the passwords of high-profile reporters and other staff members. Boy still held in underground bunker 4min

Source: hacking – Google News

Filed under Blog by

Traveler tips: How to avoid hacking of your laptop, mobile device while overseas – Minneapolis Star Tribune


Minneapolis Star Tribune
Traveler tips: How to avoid hacking of your laptop, mobile device while overseas
Minneapolis Star Tribune
Traveler tips: How to avoid hacking of your laptop, mobile device while overseas. Article by: PAULINE JELINEK , Associated Press; Updated: January 31, 2013 – 3:48 PM. hide. A traveler worked on his laptop computer from a sleek loung chair – part of the

and more »

Source: hacking – Google News

Filed under Blog by

More Next-Level IKEA Hacking: Matt Hope’s Air-Filtering Beijing Bicycle – Core77.com (blog)


Core77.com (blog)
More Next-Level IKEA Hacking: Matt Hope's Air-Filtering Beijing Bicycle
Core77.com (blog)
Cycling has long been regarded as a sustainable alternative to fossil fuel-based modes of transportation, but in rapidly modernizing Chinese cities, the boom in the latter has discouraged the prevalence of the former. Beijing, for one, is notorious for

Source: hacking – Google News

Filed under Blog by

China’s Hacking of NY Times Recalls Another Attack in 1998 – All Things Digital

China's Hacking of NY Times Recalls Another Attack in 1998
All Things Digital
lolcat_hacked-feature There's going to be an awful lot to say about the massive hacking effort by attackers thought to reside in China that rocked the New York Times last year. And much of what can be said is already there in the longish takeout on the

Source: hacking – Google News

Filed under Blog by

Special Advertising Section – Wall Street Journal

Special Advertising Section
Wall Street Journal
Welcome to the New Age of Hacking. The New York Times reported it sustained Chinese hack attacks for four months, just the latest in a new age of hacking. WSJ's Spencer Ante reports on Digits. Photo: Getty Images. Up Next

Source: hacking – Google News

Filed under Blog by

Traveler tips: How to avoid hacking of your laptop, mobile device while overseas – Washington Post


Washington Post
Traveler tips: How to avoid hacking of your laptop, mobile device while overseas
Washington Post
WASHINGTON — Some tips to help business travelers protect their laptops and mobile devices from spying — or at least limit the damage of hacking — while in China or other nations that may want to steal company information: —Don't take your work or

Source: hacking – Google News

Filed under Blog by

Hacking the Times: China’s reach, and its rules, push beyond its borders – Washington Post (blog)


New Yorker (blog)
Hacking the Times: China's reach, and its rules, push beyond its borders
Washington Post (blog)
The hackers would start digging into the New York Times' systems at about 8 a.m., Beijing time, and persist for about the length of a standard work day, according to the newspaper's account of its months-long battle with China-based cyber assaults.
Hacking with Chinese CharacteristicsNew Yorker (blog)
New York Times hacking revelations shed new light on China cybercrimeThe Guardian
The People's Republic of Hacking – by Adam SegalForeign Policy (blog)
Gizmodo -Naked Security
all 181 news articles »

Source: hacking – Google News

Filed under Blog by

New York Times hacking revelations shed new light on China cybercrime – The Guardian


The Guardian
New York Times hacking revelations shed new light on China cybercrime
The Guardian
The hackers gained entry to the newspaper's internal systems and accessed the personal computers of 53 employees including David Barboza, its Shanghai bureau chief and author of the Wen exposé, and Jim Yardley, a former Beijing bureau chief.

Source: hacking – Google News

Filed under Blog by

News Corp. Said to Face New Phone-Hacking Suits After Deadline – Bloomberg

News Corp. Said to Face New Phone-Hacking Suits After Deadline
Bloomberg
(NWSA)'s U.K. publishing unit faces at least six new lawsuits by victims of tabloid phone hacking even after a court-issued deadline passed for filing such cases, according to two people familiar with the matter. The new victims will seek permission at

Source: hacking – Google News

Filed under Blog by

Hacking with Chinese Characteristics – New Yorker (blog)


New Yorker (blog)
Hacking with Chinese Characteristics
New Yorker (blog)
The Times has gone public with the story of how it has been under persistent attack from Chinese hackers for four months, ever since they got wind that the Times was preparing to reveal that Prime Minister Wen Jiabao's family acquired $2.7 billion in
New York Times hacking revelations shed new light on China cybercrimeThe Guardian
The People's Republic of Hacking – by Adam SegalForeign Policy (blog)
Chinese Hackers Have Been Hacking the New York Times for the Past 4 MonthsGizmodo
Village Voice (blog) -Radio Australia
all 171 news articles »

Source: hacking – Google News

Filed under Blog by

The People’s Republic of Hacking – by Adam Segal – Foreign Policy (blog)

The People's Republic of Hacking – by Adam Segal
Foreign Policy (blog)
In an extraordinary story that has become depressingly ordinary, the New York Times reports that Chinese hackers "persistently" attacked the newspaper, "infiltrating its computer systems and getting passwords for its reporters and other employees.

Source: hacking – Google News

Filed under Blog by

Hacking robotic arms, predicting flight arrival times, manufacturing in … – O’Reilly Radar

Hacking robotic arms, predicting flight arrival times, manufacturing in
O’Reilly Radar
Hacking robotic arms, predicting flight arrival times, manufacturing in America, tracking Disney customers (industrial Internet links). The next wave of manufacturing will be highly automated–and American. Also, a hardware hacking collective

Source: hacking – Google News

Filed under Blog by

The Week in Privacy Problems: Who’s Hacking, Selling, and Manipulating Your … – Village Voice (blog)


Village Voice (blog)
The Week in Privacy Problems: Who's Hacking, Selling, and Manipulating Your
Village Voice (blog)
Last night, Chinese hackers broke into the Times' computer network and stole every single employee's password, then used the data to access 53 employees' personal devices. The paper attracted Chinese ire when, back in October, it reported that China's

Source: hacking – Google News

Filed under Blog by

A short history of hacking attacks against the media – Naked Security


Naked Security
A short history of hacking attacks against the media
Naked Security
August 2008 A full-blown conflict between Russian and Georgian forces spills over into defacements and denial-of-service attacks against a number of websites. These include the Georgian Ministry of Foreign Affairs website – where hackers posted a

Source: hacking – Google News

Filed under Blog by

China dismisses hacking accusations – Radio Australia


Radio Australia
China dismisses hacking accusations
Radio Australia
Asked about cyber-spying and hacking accusations made against China in general, he said: "To arbitrarily assert and to conclude without hard evidence that China participated in such hacking attacks is totally irresponsible. "China is also a victim of

Source: hacking – Google News

Filed under Blog by

Top Stories: Hagel Hearings Open; NY Times Hacking Attack – NPR (blog)

Top Stories: Hagel Hearings Open; NY Times Hacking Attack
NPR (blog)
Hack Attack On 'New York Times' Looks Like Part Of Chinese Campaign. And here are more early headlines: Alabama Gunman Still Holds Child Hostage, Negotiations Continue. (WSFA-TV). French Troops Take Northern Malian Airport From Rebels, Urge

Source: hacking – Google News

Filed under Blog by

Top Stories: Hagel Hearings Open; NY Times Hacking Attack – NPR (blog)

Top Stories: Hagel Hearings Open; NY Times Hacking Attack
NPR (blog)
Hack Attack On 'New York Times' Looks Like Part Of Chinese Campaign. And here are more early headlines: Alabama Gunman Still Holds Child Hostage, Negotiations Continue. (WSFA-TV). French Troops Take Northern Malian Airport From Rebels, Urge

Source: hacking – Google News

Filed under Blog by