Andy Greenberg and Kim Zetter Security Date of Publication: 12.28.15.
From cars to medical devices to guns, this was the year hackers found and exploited computers in everything.
" “There’s a message here for TrackingPoint and other companies,” Sandvik told WIRED at the time. “When you put technology on items that haven’t had it before, you run into security challenges you haven’t thought about before.” That rule certainly applies to any consumer-focused company thinking of connecting their product to the Internet of Things. But for those whose product can kill—whether a gun, a medical implant, or a car—let’s hope the lesson is taken more seriously in 2016."
From the late 90s, illegal filesharing gradually brought the music industry to its knees. Exclusive extracts from Stephen Witt’s book pinpoint how music ‘got free’
abt Alan Ellis
a comment: ""Brought the music industry to it's knees"? Bollocks. End of story."
FOSS ILS in Academic Libraries. A map of academic libraries using a FOSS ILS. Data from http://www.librarytechnology.org/libwebcats/ - Koha (yellow) - Evergreen (green) - OPALS (purple) - NewGenLib (red)
Mar. 01, 1995 By STEWART BRAND (editor of the Whole Earth Catalog, founder of The Well etc.) : "As Steven Levy chronicled in his 1984 book, Hackers: Heroes of the Computer Revolution, there were three generations of youthful computer programmers who deli
Today (24 March 2010) two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to
"Det ser ut att ljusna i världsekonomin. Trots det ökar serverlösheten dramatiskt i Sverige. Fler och fler företag inser nämligen att det finns pengar att tjäna på att lägga e-post, projektverktyg och andra IT-lösningar i ”Molnet”. Man betalar bara för så
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
While Android may have the legal licensing to qualify as open source, it utterly fails on the equally important issues of transparency and community. Android basically gives you two options: Accept what Google gives you, or fork the entire codebase. Other
December 1, 2004. "Mr. Tenet, who retired in July as director of the CIA after seven years, warned that ...""I know that these actions will be controversial in this age when we still think the Internet is a free and open society with no control or accoun
The social potential embodied in Slashcode was available when Naomi Klein's January 2000 book No Logo: Taking Aim at the Brand Bullies became a sudden international best-seller. .. A book is a highly hierarchical and centralized form of communication - t
The gradual disappearance of open wireless networks is a tragedy of the commons, with a confusing twist of privacy and security debate. This essay explains why the progressive locking of wireless networks is harmful — for convenience, for privacy and for
J. Xu, Y. Gao, S. Christley, and G. Madey. HICSS '05: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 7, page 198. Washington, DC, USA, IEEE Computer Society, (2005)