AUTHOR ARCHIVES

Rebecca Greenfield

Results 11-20 of 178

There Are at Least Three Easy Ways to Hack the Emergency Alert System

July 10, 2013 FROM NEXTGOV arrow The small-scale hacking of the Emergency Alert System in Montana to broadcast a supposed zombie apocalypse earlier this year, revealed the possible safety hazards of a vulnerable alert system, making this new report on various ways to hack the system all the more alarming.According to an IOActive Security Advisory published, ...

The Government Is Snooping Through Your Snail Mail

July 5, 2013 In addition to the email and phone metadata the U.S. government is tracking, the feds also have an eye on your regular old snail mail, which is actually a "treasure trove of information," according to a former FBI agent who used to work with the Mail Isolation Control and Tracking ...

What Your Email Metadata Told the NSA About You

June 28, 2013 FROM NEXTGOV arrow President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows that Obama eventually told the NSA to stop collecting your email communications in 2011, apparently because the so-called ...

The Myth of the Cool Office

June 25, 2013 Don't be fooled by the perks at all those Silicon Valley (and Alley) offices — it's all just part of a subtle plot to control employee behavior. The founders of Fab.com, which just got itself a $1 billion valuation, admitted as much to Bloomberg's Sarah Freier. The shopping site wields ...

Facebook's Former Security Chief Now Works for the NSA

June 21, 2013 FROM NEXTGOV arrow About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense. The Chief Security Officer at a tech company is primarily concerned with keeping its ...

Which Tech Company Does the NSA Use Most?

June 19, 2013 FROM NEXTGOV arrow Of the nine companies supposedly working with the government on PRISM, six and a half —Yahoo, Facebook, Microsoft (which may or may not include Skype), Apple, and Google/YouTube(sort of) — have disclosed the number of government requests they get including the secret FISA court ones, giving us an idea of ...

Should We Blame Social Media for Graffiti in National Parks?

June 6, 2013 FROM NEXTGOV arrow It's always disturbing to see vandalism in our national parks, but it's not so clear, as this New York Times story suggests, that social media is exacerbating the problem. The report quotes park personnel who blame the Internet for encouraging vandals. "With social media people take pictures of what they’ve ...

Linked In Jumps on the 2-Step Password Train Because It Looks Good

June 3, 2013 FROM NEXTGOV arrow A little less than a year after six million passwords got hacked from the site, LinkedIn has added the more secure two-step verification, probably to look just as responsible as all the other tech sites adding a step these days. LinkedIn hasn't had a breach since the high-profile hack last ...

All Your Worst Fears About Google Glass Are Coming True

May 30, 2013 FROM NEXTGOV arrow It only took about six weeks for developers to take all of the theoretically creepy things the Internet dreamt up about the face computer of the future and turn those into real-life Google Glass nightmares. In addition to that creepy walking-and-stalking app Wink, Glassholes can look forward to a porn ...

Five Steps to Avoid Getting Hacked

May 28, 2013 FROM NEXTGOV arrow It took three hackers less than a day to decipher the majority of a list of 16,000 encrypted passwords, all because of the laughably easy-to-crack passwords most of us pick to protect our online lives. The most successful guy got 90 percent of the "plains," as hackers call deciphered passwords ...