Read a little. Learn a lot. • Tightly-written news, views and stuff • Follow us on TwitterBe a Facebook FanTumble us!

07 Aug 2009 12:31

tags

Tech, World: To silence ONE GUY, Russia had to take down Twitter

twitterhack0607
  • The lack of logic and high level of selfishness here (on Russia’s part) is atrocious. Russian authorities tried to silence Cyxymu, a.k.a. “George,” for his stance on the Georgia conflict. (The timing was political.) But instead, Russia tried to shut down every major social network, causing the guy they wanted to silence to have an even bigger voice. Genius, Russia. Just genius.source

11 Jul 2009 11:49

tags

Tech: Image-uploading web sites like Imageshack are serious business

imageshackhack0711
  • Well … that’s a pretty notable hack. These guys hacked a site that millions of people use to tell the world that security exploits need to not be openly talked about – the hacking equivalent of snitches. Most of us don’t care, but probably should more.source

29 May 2009 13:13

tags

U.S.: President Barack Obama: Cybertheft victim

  • Cyberspace is real and so are the risks that come with it. I know how it feels to have privacy violated because it has happened to me.
  • President Barack Obama • who revealed today, while launching a new initiative to fight cybercrime that his presidential campaign suffered a break-in by hackers last year, although they did not swipe information from campaign contributors. He also noted that a new cyber czar would be part of the initiative, though he didn’t name names. • source

11 May 2009 23:34

tags

Tech, U.S.: Court: A dude uploaded naked pics of himself? Clearly it’s hacking.

  • Richard Wolf was looking at (and distributing) porn at work. An Ohio appellate court upheld a felony hacking conviction last week of Wolf that claimed he exceeded his authorized use of the computer. Part of the reason Wolf is facing this conviction is that the law has stretched – The Computer Fraud and Abuse Act has been allowed to be amended by the states who have put in restrictions against access to unauthorized information at work. Technically, porn is unauthorized, but most experts agree that was never the intent of the law. source

07 May 2009 10:01

tags

Tech: T-Mobile: We’ll support your iPhone even if we don’t sell it

  • All in all, this cements my loyalty to T-Mobile. Even without officially supporting a particular phone, they are willing to make accommodations to ensure the iPhone users on their network continue to enjoy good service.
  • Consumerist reader “John” • On his positive experience with the wireless provider after his unlocked, jailbroken iPhone went wonky due to a problem on T-Mobile’s end. The company offered service credits to affected customers and a rep even went so far as to post on Apple hacking forum about the problem. Well, that’s just awesome. • source

28 Mar 2009 17:02

tags

Tech, World: China’s spying on a bunch of PCs, including the Dalai Lama’s

  • 1,295 computers around the world were infiltrated by computers based almost entirely in China source