|
Sources Select ResourcesThe FBI Can Bypass EncryptionWhy Cyber Security is a Magic Act Blunden, Bill Article 2014 CounterPunch How to Leak to The InterceptLee, Micah Article 2015 The Intercept Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely. The Motherboard Guide to Not Getting HackedMotherboard Staff Article 2017 VICE Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb... Passphrases That You Can Memorize - But That Even the NSA Can't GuessLee, Micah Article 2015 The Intercept A passphrase is like a password, but longer and more secure. In essence, it's an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer secu... Popular Security Software Came Under Relentless NSA and GCHQ AttacksFishman, Andrew; Marquis-Boire, Morgan Article 2015 The Intercept The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 TomDispatch In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... US was 'key player in cyber-attacks on Iran's nuclear programme'Obama reported to have approved bid to target Tehran's nuclear efforts Beaumont, Peter; Hopkins, Peter Article 2012 The Guardian Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies. Watch your attachments: Microsoft Office bug lets hackers take over computersArticle 2014 RT A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr... Why you shouldn't trust Geek Squad ever againThe government reportedly pays Geek Squad technicians to dig through your PC Patrizio, Andy Article 2017 Network World The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gen... With Virtual Machines, Getting Hacked Doesn't Have To Be That BadLee, Micah Article 2015 The Intercept Lee explains how to install and use a virtual machine, a fake computer running inside the real computer.
|
|
Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.
|