Search for: "Kim Zetter" Results 1 - 20 of 118
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 Aug 2023, 8:58 am by Eugene Volokh
Kim Zetter, Hackers Finally Post Stolen Ashley Madison Data, Wired, Aug. 18, 2015, https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data (discussing Ashley Madison data breach and hackers' threat to "release all customer records, including profiles with all the customers' secret sexual fantasies and matching credit card transactions, real names and addresses. [read post]
9 May 2023, 11:03 am by Stewart Baker
Nate and I recommend Kim Zetter’s revealing story on the  SolarWinds hack. [read post]
8 May 2023, 6:54 pm by Stewart Baker
Nate and I recommend Kim Zetter's revealing story on the  SolarWinds hack. [read post]
21 Mar 2022, 7:58 am by China Law Blog
We discuss: Jack’s background as an information security professional The passion for podcasts that led to Darknet Diaries How the proliferation of electronic devices both facilitates and compromises security Hackers The need for legal upgrades to better address cyber threats Listening, and watching recommendations from: Jack Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, by Andy Greenberg Countdown to Zero Day: Stuxnet and the Launch of the… [read post]
21 Jan 2022, 1:58 pm by Stephanie Pell
Cybersecurity and national security journalist Kim Zetter tweeted on Jan. 14 that “[t]here’s currently no indication that the attacks went beyond defacement [of government websites] and DDoS [distributed denial of service], but it’s too early to say. [read post]
10 Apr 2021, 7:15 am by Victoria Gallegos
   Stewart Baker shared an episode of the Cyberlaw Podcast, featuring an interview with Kim Zetter, journalist and author on cybersecurity and national security topics, about the domestic “gap” in cybersecurity surveillance:  Abby Lemert and Eleanor Runde examined the latest U.S. [read post]
7 Apr 2021, 11:33 am by Victoria Gallegos
  Stewart Baker shared an episode of the Cyberlaw Podcast, featuring an interview with Kim Zetter, journalist and author on cybersecurity and national security matters, about the domestic “gap” in cybersecurity surveillance at the National Security Agency and Cyber Command. [read post]
6 Apr 2021, 9:21 am by Stewart Baker
Our interview is with Kim Zetter, author of the best analysis to date of the weird messaging from the National Security Agency (NSA) and Cyber Command about the domestic “blind spot” or “gap” in their cybersecurity surveillance. [read post]
6 Apr 2021, 8:41 am by Stewart Baker
[Episode 356 of the Cyberlaw Podcast] Our interview is with Kim Zetter, author of the best analysis to date of the weird messaging from NSA and Cyber Command about the domestic "blind spot" or "gap" in their cybersecurity surveillance. [read post]
15 Jul 2020, 12:43 pm by Robert Chesney
In a major story this morning, Yahoo News (Zach Dorfman, Kim Zetter, Jenna McLaughlin and Sean Naylor) disclose the existence of a 2018 presidential covert action finding altering the terms on which CIA can (and should) engage adversaries via cyber means. [read post]
26 Jun 2020, 3:00 am by Jim Sedor
National/Federal A Winner on Election Day in November? [read post]
23 Jun 2020, 3:00 am by Jim Sedor
” by Kim Zetter for Politico Ethics National: “Treasury, SBA Cave to Demands for Bailout Transparency” by Victoria Guida for Politico National: “Judge: Bolton can publish book despite efforts to block” by Eric Tucker for AP News Maryland: “Former Baltimore Mayor Catherine Pugh Pleads Guilty in State Court to Perjury in ‘Healthy Holly’ Scandal” by Tim Prudente for Baltimore Sun South Carolina: “Conflict of interest? [read post]
3 Oct 2019, 10:30 am by Sean Gallagher
And the unmasking wasn't very hard to do, since, as Kim Zetter reports for Vice, the government group used Kaspersky antivirus software—which sent binaries of the malware it was developing back to Kaspersky for analysis. [read post]
14 Jan 2019, 4:47 am by Paul Rosenzweig
UPDATE:  In the interest in giving reporting credit where it is due, it has since been called to my attention that the Post report noted above builds on a story that was first broken by Kim Zetter, and which, in turn builds on earlier reporting by Josh Gerstein, both of Politico. [read post]
9 Jan 2019, 1:48 pm by Sean Gallagher
Now, a new report by Kim Zetter for Politico suggests that the NSA and the Justice Department tracked down Martin thanks to information shared by an ironic source: the Moscow-based malware protection company Kaspersky Lab. [read post]
5 Oct 2017, 2:40 pm by Stewart Baker
  Panel members included Cristin Goodwin of Microsoft, Rob Knake of the Council on Foreign Relations, Hannah Kuchler of the Financial Times, and Kim Zetter, author of a 2014 book on the Stuxnet attack. [read post]
14 Jun 2017, 5:37 pm by Dan Goodin
Reporter Kim Zetter writes: Within the mother lode Lamb found on the center’s website was a database containing registration records for the state’s 6.7 million voters; multiple PDFs with instructions and passwords for election workers to sign in to a central server on Election Day; and software files for the state’s ExpressPoll pollbooks — electronic devices used by poll workers to verify that a voter is registered before allowing them to cast a ballot. [read post]
14 Jun 2017, 8:38 am by Nicholas Weaver
Kim Zetter has another good report at Motherboard, and Dragos has the technical details. [read post]
23 Aug 2016, 10:45 am by Susan Hennessey
Policy Manager, Access Now Eva Galperin: Global Policy Analyst at the Electronic Frontier Foundation Jennifer Granick: Director of Civil Liberties at The Center for Internet and Society at Stanford Law School Riana Pfefferkorn: Cryptography Fellow at The Center for Internet and Society at Stanford Law School Susan Hennessey: Fellow in National Security in Governance Studies at the Brookings Institution and Managing Editor of Lawfare Katie Moussouris: Cybersecurity Fellow at the New America… [read post]
10 Aug 2016, 1:27 pm by Steven Boutwell
. _____________________________________________ [1] United States Government Interagency Guidance Document, How to Protect Your Networks from Ransomware, Justice.gov (available at https://www.justice.gov/criminal-ccips/file/872771/download). [2] Kim Zetter, Why Hospitals are the Perfect Targets for Ransomware, Wired.com (13:31:00, Mar. 30, 2016) (available at https://www.wired.com/2016/03/ransomware-why-hospitals-are-the-perfect-targets/). [3] Id.; Joseph Conn, Hospital Pays… [read post]