AUTHOR ARCHIVES

Rebecca Greenfield

Results 11-20 of 178

There Are at Least Three Easy Ways to Hack the Emergency Alert System

July 10, 2013 FROM NEXTGOV arrow The small-scale hacking of the Emergency Alert System in Montana to broadcast a supposed zombie apocalypse earlier this year, revealed the possible safety hazards of a vulnerable alert system, making this new report on various ways to hack the system all the more alarming.According to an IOActive Security Advisory published,...

The Government Is Snooping Through Your Snail Mail

July 5, 2013 In addition to the email and phone metadata the U.S. government is tracking, the feds also have an eye on your regular old snail mail, which is actually a "treasure trove of information," according to a former FBI agent who used to work with the Mail Isolation Control and Tracking...

What Your Email Metadata Told the NSA About You

June 28, 2013 FROM NEXTGOV arrow President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows that Obama eventually told the NSA to stop collecting your email communications in 2011, apparently because the so-called...

The Myth of the Cool Office

June 25, 2013 Don't be fooled by the perks at all those Silicon Valley (and Alley) offices — it's all just part of a subtle plot to control employee behavior. The founders of Fab.com, which just got itself a $1 billion valuation, admitted as much to Bloomberg's Sarah Freier. The shopping site wields...

Facebook's Former Security Chief Now Works for the NSA

June 21, 2013 FROM NEXTGOV arrow About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense. The Chief Security Officer at a tech company is primarily concerned with keeping its...

Which Tech Company Does the NSA Use Most?

June 19, 2013 FROM NEXTGOV arrow Of the nine companies supposedly working with the government on PRISM, six and a half —Yahoo, Facebook, Microsoft (which may or may not include Skype), Apple, and Google/YouTube(sort of) — have disclosed the number of government requests they get including the secret FISA court ones, giving us an idea of...

Should We Blame Social Media for Graffiti in National Parks?

June 6, 2013 FROM NEXTGOV arrow It's always disturbing to see vandalism in our national parks, but it's not so clear, as this New York Times story suggests, that social media is exacerbating the problem. The report quotes park personnel who blame the Internet for encouraging vandals. "With social media people take pictures of what they’ve...

Linked In Jumps on the 2-Step Password Train Because It Looks Good

June 3, 2013 FROM NEXTGOV arrow A little less than a year after six million passwords got hacked from the site, LinkedIn has added the more secure two-step verification, probably to look just as responsible as all the other tech sites adding a step these days. LinkedIn hasn't had a breach since the high-profile hack last...

All Your Worst Fears About Google Glass Are Coming True

May 30, 2013 FROM NEXTGOV arrow It only took about six weeks for developers to take all of the theoretically creepy things the Internet dreamt up about the face computer of the future and turn those into real-life Google Glass nightmares. In addition to that creepy walking-and-stalking app Wink, Glassholes can look forward to a porn...

Five Steps to Avoid Getting Hacked

May 28, 2013 FROM NEXTGOV arrow It took three hackers less than a day to decipher the majority of a list of 16,000 encrypted passwords, all because of the laughably easy-to-crack passwords most of us pick to protect our online lives. The most successful guy got 90 percent of the "plains," as hackers call deciphered passwords...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.