AUTHOR ARCHIVES

Rebecca Greenfield

Results 11-20 of 178

There Are at Least Three Easy Ways to Hack the Emergency Alert System

July 10, 2013 FROM NEXTGOV arrow The small-scale hacking of the Emergency Alert System in Montana to broadcast a supposed zombie apocalypse earlier this year, revealed the possible safety hazards of a vulnerable alert system, making this new report on various ways to hack the system all the more alarming.According to an IOActive Security Advisory published,...

The Government Is Snooping Through Your Snail Mail

July 5, 2013 In addition to the email and phone metadata the U.S. government is tracking, the feds also have an eye on your regular old snail mail, which is actually a "treasure trove of information," according to a former FBI agent who used to work with the Mail Isolation Control and Tracking...

What Your Email Metadata Told the NSA About You

June 28, 2013 FROM NEXTGOV arrow President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows that Obama eventually told the NSA to stop collecting your email communications in 2011, apparently because the so-called...

The Myth of the Cool Office

June 25, 2013 Don't be fooled by the perks at all those Silicon Valley (and Alley) offices — it's all just part of a subtle plot to control employee behavior. The founders of Fab.com, which just got itself a $1 billion valuation, admitted as much to Bloomberg's Sarah Freier. The shopping site wields...

Facebook's Former Security Chief Now Works for the NSA

June 21, 2013 FROM NEXTGOV arrow About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense. The Chief Security Officer at a tech company is primarily concerned with keeping its...

Which Tech Company Does the NSA Use Most?

June 19, 2013 FROM NEXTGOV arrow Of the nine companies supposedly working with the government on PRISM, six and a half —Yahoo, Facebook, Microsoft (which may or may not include Skype), Apple, and Google/YouTube(sort of) — have disclosed the number of government requests they get including the secret FISA court ones, giving us an idea of...

Should We Blame Social Media for Graffiti in National Parks?

June 6, 2013 FROM NEXTGOV arrow It's always disturbing to see vandalism in our national parks, but it's not so clear, as this New York Times story suggests, that social media is exacerbating the problem. The report quotes park personnel who blame the Internet for encouraging vandals. "With social media people take pictures of what they’ve...

Linked In Jumps on the 2-Step Password Train Because It Looks Good

June 3, 2013 FROM NEXTGOV arrow A little less than a year after six million passwords got hacked from the site, LinkedIn has added the more secure two-step verification, probably to look just as responsible as all the other tech sites adding a step these days. LinkedIn hasn't had a breach since the high-profile hack last...

All Your Worst Fears About Google Glass Are Coming True

May 30, 2013 FROM NEXTGOV arrow It only took about six weeks for developers to take all of the theoretically creepy things the Internet dreamt up about the face computer of the future and turn those into real-life Google Glass nightmares. In addition to that creepy walking-and-stalking app Wink, Glassholes can look forward to a porn...

Five Steps to Avoid Getting Hacked

May 28, 2013 FROM NEXTGOV arrow It took three hackers less than a day to decipher the majority of a list of 16,000 encrypted passwords, all because of the laughably easy-to-crack passwords most of us pick to protect our online lives. The most successful guy got 90 percent of the "plains," as hackers call deciphered passwords...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.