Search for: "Kim Zetter"
Results 1 - 20
of 118
Sort by Relevance
|
Sort by Date
31 Aug 2023, 8:58 am
Kim Zetter, Hackers Finally Post Stolen Ashley Madison Data, Wired, Aug. 18, 2015, https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data (discussing Ashley Madison data breach and hackers' threat to "release all customer records, including profiles with all the customers' secret sexual fantasies and matching credit card transactions, real names and addresses. [read post]
9 May 2023, 11:03 am
Nate and I recommend Kim Zetter’s revealing story on the SolarWinds hack. [read post]
8 May 2023, 6:54 pm
Nate and I recommend Kim Zetter's revealing story on the SolarWinds hack. [read post]
21 Mar 2022, 7:58 am
We discuss: Jack’s background as an information security professional The passion for podcasts that led to Darknet Diaries How the proliferation of electronic devices both facilitates and compromises security Hackers The need for legal upgrades to better address cyber threats Listening, and watching recommendations from: Jack Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, by Andy Greenberg Countdown to Zero Day: Stuxnet and the Launch of the… [read post]
21 Jan 2022, 1:58 pm
Cybersecurity and national security journalist Kim Zetter tweeted on Jan. 14 that “[t]here’s currently no indication that the attacks went beyond defacement [of government websites] and DDoS [distributed denial of service], but it’s too early to say. [read post]
10 Apr 2021, 7:15 am
Stewart Baker shared an episode of the Cyberlaw Podcast, featuring an interview with Kim Zetter, journalist and author on cybersecurity and national security topics, about the domestic “gap” in cybersecurity surveillance: Abby Lemert and Eleanor Runde examined the latest U.S. [read post]
7 Apr 2021, 11:33 am
Stewart Baker shared an episode of the Cyberlaw Podcast, featuring an interview with Kim Zetter, journalist and author on cybersecurity and national security matters, about the domestic “gap” in cybersecurity surveillance at the National Security Agency and Cyber Command. [read post]
6 Apr 2021, 9:21 am
Our interview is with Kim Zetter, author of the best analysis to date of the weird messaging from the National Security Agency (NSA) and Cyber Command about the domestic “blind spot” or “gap” in their cybersecurity surveillance. [read post]
6 Apr 2021, 8:41 am
[Episode 356 of the Cyberlaw Podcast] Our interview is with Kim Zetter, author of the best analysis to date of the weird messaging from NSA and Cyber Command about the domestic "blind spot" or "gap" in their cybersecurity surveillance. [read post]
15 Jul 2020, 12:43 pm
In a major story this morning, Yahoo News (Zach Dorfman, Kim Zetter, Jenna McLaughlin and Sean Naylor) disclose the existence of a 2018 presidential covert action finding altering the terms on which CIA can (and should) engage adversaries via cyber means. [read post]
26 Jun 2020, 3:00 am
National/Federal A Winner on Election Day in November? [read post]
23 Jun 2020, 3:00 am
” by Kim Zetter for Politico Ethics National: “Treasury, SBA Cave to Demands for Bailout Transparency” by Victoria Guida for Politico National: “Judge: Bolton can publish book despite efforts to block” by Eric Tucker for AP News Maryland: “Former Baltimore Mayor Catherine Pugh Pleads Guilty in State Court to Perjury in ‘Healthy Holly’ Scandal” by Tim Prudente for Baltimore Sun South Carolina: “Conflict of interest? [read post]
3 Oct 2019, 10:30 am
And the unmasking wasn't very hard to do, since, as Kim Zetter reports for Vice, the government group used Kaspersky antivirus software—which sent binaries of the malware it was developing back to Kaspersky for analysis. [read post]
14 Jan 2019, 4:47 am
UPDATE: In the interest in giving reporting credit where it is due, it has since been called to my attention that the Post report noted above builds on a story that was first broken by Kim Zetter, and which, in turn builds on earlier reporting by Josh Gerstein, both of Politico. [read post]
9 Jan 2019, 1:48 pm
Now, a new report by Kim Zetter for Politico suggests that the NSA and the Justice Department tracked down Martin thanks to information shared by an ironic source: the Moscow-based malware protection company Kaspersky Lab. [read post]
5 Oct 2017, 2:40 pm
Panel members included Cristin Goodwin of Microsoft, Rob Knake of the Council on Foreign Relations, Hannah Kuchler of the Financial Times, and Kim Zetter, author of a 2014 book on the Stuxnet attack. [read post]
14 Jun 2017, 5:37 pm
Reporter Kim Zetter writes: Within the mother lode Lamb found on the center’s website was a database containing registration records for the state’s 6.7 million voters; multiple PDFs with instructions and passwords for election workers to sign in to a central server on Election Day; and software files for the state’s ExpressPoll pollbooks — electronic devices used by poll workers to verify that a voter is registered before allowing them to cast a ballot. [read post]
14 Jun 2017, 8:38 am
Kim Zetter has another good report at Motherboard, and Dragos has the technical details. [read post]
23 Aug 2016, 10:45 am
Policy Manager, Access Now Eva Galperin: Global Policy Analyst at the Electronic Frontier Foundation Jennifer Granick: Director of Civil Liberties at The Center for Internet and Society at Stanford Law School Riana Pfefferkorn: Cryptography Fellow at The Center for Internet and Society at Stanford Law School Susan Hennessey: Fellow in National Security in Governance Studies at the Brookings Institution and Managing Editor of Lawfare Katie Moussouris: Cybersecurity Fellow at the New America… [read post]
10 Aug 2016, 1:27 pm
. _____________________________________________ [1] United States Government Interagency Guidance Document, How to Protect Your Networks from Ransomware, Justice.gov (available at https://www.justice.gov/criminal-ccips/file/872771/download). [2] Kim Zetter, Why Hospitals are the Perfect Targets for Ransomware, Wired.com (13:31:00, Mar. 30, 2016) (available at https://www.wired.com/2016/03/ransomware-why-hospitals-are-the-perfect-targets/). [3] Id.; Joseph Conn, Hospital Pays… [read post]