hacking

  • An Apple keyboard with a key that says hack and is colored red, white and blue.

    Is Russia Trying to Hack American Politics? Picks of the Week

    Powell emails were leaked on a site linked to the Russian government | The Washington Post World Doping Agency Says Russian Hackers Stole Medical Records of Olympic Athletes | The Wall Street Journal How the next President can get cybersecurity right | Passcode The latest edition of the (almost) weekly hacks that appeared on the front pages of the newspapers this week featured the personal emails of former Secretary of … Read More

  • Image from a Fall 2016 Lecture on Pope Francis' encyclical.

    Fall 2016 Event Series Announced

    Today the Pell Center announced a wide array of events for fall 2016, encompassing topics ranging from the ethical challenges of new technologies to the history and legacy of slavery in New England. In addition, there are several events covering the 2016 presidential race. Tickets to Pell Center events are free. Please RSVP in advance for each event on the Pell Center’s Eventbrite page, as seating is limited to 100. Call 401-341-2927 with any questions … Read More

  • An American flag with a cyber design.

    It’s Time for Both Parties to Get Serious about Cybersecurity: Picks of the Week

      U.S. Seeks to Protect Voting System from Cyberattacks | The New York Times Political Campaigns need Chief Information Security Officers | Passcode How to Hack the Election in 7 Minutes | Politico Magazine   In the wake of hacks that infiltrated the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and the Hillary Clinton campaign, in addition to the political fallout and the multiple warnings from cybersecurity experts … Read More

  • Image of a Businessman Holding a Laptop, Surrounded By an American Flag and the Planet Earth

    Picks of the Week: What Leaders Should Learn from the Clinton’s Email Controversy

    Hillary Clinton’s Email Was Probably Hacked, Experts Say | The New York Times Hillary Clinton Calls for Stronger Cybersecurity Measures | Bloomberg The damning things the FBI said about Clinton’s email | USA Today This week, FBI Director James Comey concluded a year-long probe of Hillary Clinton’s email practices and her use of a private server during her tenure as Secretary of State by announcing that he would not be … Read More

  • Cyber Attack A01

    Picks of the Week: Government Struggles with Cybersecurity Vulnerabilities

    How the Story of Hillary Clinton’s Emails Has Changed | The New York Times AP Exclusive: Under Clinton, State’s Cybersecurity Suffered | Associated Press Teen Who Hacked CIA Director’s Email Tells How He Did It | Wired While Hillary Clinton continues to face scrutiny for her email practices and the use of a private server during her tenure as Secretary of State, other government officials have recently had other problems … Read More

  • Second Italian Renaissance Revival Rural Villa Style, IRS, Washington DC

    IRS Hacked…Again!

    Although many people may seek to avoid phone calls from the IRS, this is one you’ll want to take—the IRS is contacting nearly 100,000 people because hackers stole their personal (and sensitive) tax information. In addition, the hackers attempted to pilfer an extra 100,000 tax returns but were unsuccessful, according to the agency. The IRS breach is just the latest bullet point in an endless list of cyber exploits that … Read More

  • Where in the world will Edward Snowden go?

    Right now Snowden is playing the waiting game. The infamous NSA leaker partnered with WikiLeaks and filed for asylum in 21 different countries.  Currently camped in the transit area of Moscow’s Sheremetyevo International Airport, Snowden hopes to find a more permanent refuge from the espionage charges the United States have set on him. Here are the results of his efforts so far: Update: 8/1/2013 Snowden has been granted temporary asylum … Read More

  • The Human Side of Cybercrime (OpEd)

    What do cyber criminals, Greek gods, and Facebook have in common? They are all connected to “Zeus,” a Trojan horse malware program first identified in 2007, when it was used to steal information from the U.S. Department of Transportation, and that now may be lurking in a link on rigged Facebook pages. Along with phishing campaigns, Trojans are the principal method chosen by cyber criminals to attack users, allowing them … Read More

  • State of the Union Address and Cybersecurity Executive Order: President Obama Takes Action to Protect America’s Critical Infrastructure

    In his first State of the Union address since the election, President Obama warned: “We know hackers steal people’s identities and infiltrate private e-mail. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems.” The President then added: “we cannot look back years from now and wonder why we did … Read More

  • Department of Homeland Security to Java Users: Beware of Cyber Attacks!

    Over the weekend, the Department of Homeland Security’s cyber division, called US-CERT (Computer Emergency Readiness Team) issued a warning to users of the popular Java programming language—a coding platform that has existed for decades—because of vital security holes it may create. The alert said that Java 7 Update 10 and earlier versions of the software contain a critical vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary commands … Read More

Page 1 of 212