Search for: "Kim Zetter" Results 61 - 80 of 118
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Feb 2012, 6:00 am by Rachel, Law Clerk
Clients Don't Care for Sea of Sameness Female Passengers Say They Were Targeted for TSA Body Scanners (Kim Zetter/Wired.com) Outright abortion ban introduced to Iowa House Supreme Court of Canada sends mixed signals on 'do the crime, do the time' sentencing: Winnipeg Free Press Nortel collapse linked to hacking attack - Rachel Spence, Law Clerk Visit our Toronto Law Firm website: www.wiselaw.net TORONTO EMPLOYMENT LAW • TORONTO CIVIL LITIGATION &… [read post]
5 Jan 2012, 8:56 pm by Kevin O'Keefe
From Kim Zetter reporting for Wired: The government is seeking the records under 18 USC 2703(d), a provision of the 1994 Stored Communications Act that governs law enforcement access to non-content Internet records, such as transaction information. [read post]
8 Nov 2011, 4:50 am
" And at Wired.com's "Threat Level" blog, Kim Zetter has a post titled "Busted! [read post]
3 Nov 2011, 9:01 pm
by Kim Zetter: Federal authorities used a fake Verizon cellphone tower to zero in on a suspect’s wireless card, and say they were perfectly within their rights to do so, even without a warrant. [read post]
24 Oct 2011, 12:37 pm by Ryan Singel
Wired senior staff writer Kim Zetter won a feature writing award from the Society for Professional Journalists of Northern California last week for her riveting story on how researchers discovered and dissected Stuxnet, a worm intricately programmed to wreak havoc on an Iranian nuclear facility. [read post]
20 Oct 2011, 11:16 am by Ritika Singh
Stuxnet–or a computer virus with a very similar source code–has struck again in Europe, reports John Markoff of the Times and Kim Zetter of Wired. [read post]
18 Oct 2011, 2:12 pm by Robert Chesney
Kim Zetter at Wired writes this afternoon of the discovery of a strain of malware that appears to build in significant part on components of Stuxnet–but that functions more as a reconnaisance tool enabling the future exploitation or manipulation of infected systems, rather than as a means to directly and immediately impact the operation of those systems. [read post]
5 Oct 2011, 9:13 am by Raffaela Wakeman
Kim Zetter at Wired reported on his remarks (which I can’t find online). [read post]
10 Aug 2011, 12:04 pm by Kevin Poulsen
” Top photo: Former Gizmodo editor Jason Chen/Gizmodo (With previous reporting by Kim Zetter, Brian X. [read post]
28 Jul 2011, 2:05 pm
On Wired.com today: Document: FBI Surveillance Geeks Fear, Love New Gadgets by Kim Zetter: Can’t wait for 4G to become the ubiquitous standard for mobile communication? [read post]
30 May 2011, 12:29 am by Kevin Poulsen
[Disclosure: Threat Level’s Kevin Poulsen and Kim Zetter were interviewed for the program]. [read post]
20 May 2011, 1:45 pm by Kim Zetter
[Disclosure: Threat Level's Kevin Poulsen and Kim Zetter were interviewed for the documentary.] [read post]
9 May 2011, 6:30 am
"Battle Brews Over FBI's Warrantless GPS Tracking": Kim Zetter has this post today at Wired.com's "Threat Level" blog. [read post]
3 May 2011, 11:53 am by Kevin Poulsen
My thanks to everyone who voted for us, to our freelancer writers, and especially to tireless Threat Level reporters David Kravets and Kim Zetter, the Woodward and Bernstein of privacy, security and cyber crime. [read post]
28 Dec 2010, 6:18 pm by Evan Hansen and Kevin Poulsen
But it is unfortunately necessary, thanks to the shameless and unjustified personal attacks he’s faced ever since he and Wired.com senior reporter Kim Zetter broke the news of Manning’s arrest. [read post]