Search for: "JASON HACKER" Results 61 - 80 of 175
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
19 Feb 2010, 4:48 pm by Colin O'Keefe
. - Florida attorney Santiago Cueto of Cueto Law Group on his blog International Business Law Advisor Department of Labor Secures Large Dollar Overtime Awards for Katrina Workers - New Jersey lawyer Mark Tabakman of Fox Rothschild in the firm's Wage & Hour - Development & Highlights Blog Incident(s) of the Week: February A Tough Month For Hackers - Boston attorney Gabriel Helmer of Foley Hoag on the firm's blog, Security, Privacy and The Law 8 Ways… [read post]
29 Apr 2014, 1:15 pm by Stewart Baker
 Since other countries have been “turning” their criminal hackers to patriotic duty for years, the real news may be that the US is late to the party. [read post]
18 Jun 2014, 7:00 am by Stewart Baker
  Crowdstrike outs another PLA hacker by name (not to mention his picture and his personal blog). [read post]
14 Oct 2015, 10:40 am by Joseph Fishkin
--Urja Mittal, Lina Khan, Jake Struebing, and Brian HighsmithFriday, October 162:15pm-3:00pm - Opening Keynote: Acting Assistant Attorney General Vanita Gupta3:05pm-4:20pm - Panel 1: Economic Inequality as a Threat to DemocracyJacob Hacker, James Kwak, Jedediah Purdy, Wendy WeiserThis panel will discuss the ways that extreme inequality strains -- and perhaps even precludes -- democratic practice. [read post]
23 Dec 2014, 2:15 pm by Dave Maass
Sabu and the FBI Daily Dot and Vice’s Motherboard obtained leaked chat logs and other documents, some of which were under seal, involving hacker and FBI informant Hector Xavier Monsegur, aka "Sabu. [read post]
23 Dec 2021, 10:00 am by Emily Dai
Jason Healey discussed why a more nuanced understanding of the offense-defense balance and innovations with leverage that works at scale across the internet is necessary to reverse the systemic advantage attackers have in cyberspace. [read post]
19 May 2018, 7:17 am by Rachel Bercovitz
Valentin Weber reviewed Tim Maurer’s new book, “Cyber Mercenaries: The State, Hackers, and Power. [read post]
11 Nov 2013, 10:51 am by Trevor Timm
In fact, NSA talking points, obtained by reporter Jason Leopold using the Freedom of Information Act, state that NSA should continually invoke 9/11 under the heading “sound bites that resonate. [read post]
20 Oct 2013, 9:30 pm by Dan Ernst
Hacker, The Great Risk Shift: The New Economic Insecurity and the Decline of the American Dream (2008). [read post]
28 Jul 2016, 4:41 am by Ellen Scholl
Hackers associated with nation-states are certainly not the only actors interested in energy targets. [read post]
15 Jul 2012, 1:31 am by tekEditor
[IWE] Why Lisp macros are cool, a Perl perspective Ben Tilly iwe@warhead.org.uk Fri, 29 Jul 2005 09:40:44 -0700 MJD is one of the well-known Perl hackers. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
The hacker can simply watch the public blockchain to know if and when a victim has paid up; she can even make a unique payment address for each victim and automate the process of unlocking their files upon a confirmed bitcoin transaction to that unique address. [read post]
24 Jan 2023, 5:15 am by Josh Richman
He’s a security researcher and hardware hacker with a long history in reverse engineering. [read post]
30 Dec 2021, 10:05 pm by Jeff Richardson
In an article for Macworld, Jason Snell speculates on what might be coming in the 2022 versions of the iPhone and other Apple products. [read post]
20 Jun 2019, 10:05 pm by Jeff Richardson
Jason Cross of Macworld discuss what will be new with Apple's Maps app when iOS 13 comes out later this year. [read post]
15 Sep 2022, 10:05 pm by Jeff Richardson
  Jason Cross of Macworld explains how it works. [read post]