Bloomberg

News Opinion Markets Personal Finance Tech Politics Sustainability TV Video Radio

Tech Blog

Hackers

Photograph by Julian Stratenschulte/AP Photo

Photograph by Julian Stratenschulte/AP Photo

Forget the Batphone. Here Comes the Merkelphone

German Chancellor Angela Merkel is getting a new phone. In fact, she’s buying almost 10,000 of them, for something in the neighborhood of $31 million. This summer, the German government will get the first of about 9,600 hack-proof handsets. The...

Read more »

A technician works at the Uranium Conversion Facility outside the city of Isfahan, 255 miles south of the capital Tehran, Iran, in 2007.

Photograph by Vahid Salemi/AP Photo

A technician works at the Uranium Conversion Facility outside the city of Isfahan, 255 miles south of the capital Tehran, Iran, in 2007.

Stuxnet Had Earlier, Potentially Explosive Version, Symantec Says

The developers behind Stuxnet, the computer worm that damaged an Iranian nuclear plant in 2010, began their work on the malware earlier than previously known and experimented with multiple attack techniques, according to new research by Symantec Corp. Stuxnet, which tampered...

Read more »

The control room at Exelon Corp.'s Limerick nuclear power generating station in Pennsylvania.

Photograph by Bradley C. Bower/Bloomberg

The control room at Exelon Corp.'s Limerick nuclear power generating station in Pennsylvania.

Control-Systems Bugs Jump After Stuxnet Nuclear Plant Attack

Control systems are a dream for hackers and Hollywood script-writers. They run power plants, dams, train lines and traffic lights — and they’re becoming more vulnerable to attacks that can inflict spectacular, physical destruction. According to research released today by...

Read more »

China has been the top source of cyber-attack traffic since the last quarter of 2011, according to a study by Akamai.

Photograph by ImagineChina/Corbis

China has been the top source of cyber-attack traffic since the last quarter of 2011, according to a study by Akamai.

One-Third of Cyber Attack Traffic Originates in China, Akamai Says

About one-third of the world’s cyber attack traffic was traced back to China, according to a report by Akamai Technologies to be published today. Between July and September of last year, about 33 percent of the attacks originated in China, double...

Read more »

Aaron Swartz, left, has a working lunch outside in Cambridge, Mass. in 2007.

Photograph by Wendy Maeda/The Boston Globe via Getty Images

Aaron Swartz, left, has a working lunch outside in Cambridge, Mass. in 2007.

Berners-Lee Calls Aaron Swartz’s Prosecution ‘Travesty of Justice’

Tim Berners-Lee, inventor of the World Wide Web, said today that the prosecution of Aaron Swartz, an Internet activist who killed himself while facing computer-fraud charges, was a “travesty of justice.” Berners-Lee made the remarks in an interview after a...

Read more »

Those free Android apps you download may end up costing you more than you know.

Photograph by David Paul Morris/Bloomberg

Those free Android apps you download may end up costing you more than you know.

Attack of the Android Zombies

(Corrected date when Cloudmark published its report.) A scourge of the personal computer has come to the smartphone. Anti-spam company Cloudmark said Dec. 16 that its researchers have spotted what they say is a first-of-its-kind “botnet” comprised of more than...

Read more »

Hackers are increasingly wiring money directly out of victims' online bank accounts - without ever typing a keystroke.

Photograph by Peter Dazeley

Hackers are increasingly wiring money directly out of victims' online bank accounts - without ever typing a keystroke.

How Paper Bills Could Protect You From Cyber Theft

As a computer security reporter, I’m often asked for advice on how to avoid being hacked. I quickly rattle off three safeguards: 1) Use long phrases and symbols in passwords; 2) set up two Web browsers — or better yet, two computers...

Read more »

Medical devices such as mammography machines can be vulnerable to hacking attacks.

Photograph by Gary Gershoff/Getty Images

Medical devices such as mammography machines can be vulnerable to hacking attacks.

Many Doctors Don’t Secure Medical Devices From Hackers, Study Finds

Your doctor’s office likely doesn’t have any digital security for its mammography machines, heart pumps and other devices that are vulnerable to hacking, according to a new study. In a survey of 80 health care organizations in the U.S., the...

Read more »

Experian, the credit-reporting giant, is being probed by Irish authorities after a series of data breaches.

Photograph by Mike Graff/Gallery Stock

Experian, the credit-reporting giant, is being probed by Irish authorities after a series of data breaches.

Experian U.S. Data Breaches Prompt Investigation by Irish Regulators

Experian Plc, the credit-reporting giant with financial information on more than 740 million consumers, is being investigated by Irish regulators in the wake of a series of breaches of the company’s databases. The Office of the Data Protection Commissioner, which...

Read more »

Medical identity theft affected an estimated 1.5 million people in the U.S., according to the Ponemon Institute.

Photograph by Reza Estakhrian

Medical identity theft affected an estimated 1.5 million people in the U.S., according to the Ponemon Institute.

How Medical Identity Theft Can Give You a Decade of Headaches

Arnold Salinas knows a lot about the person who stole his identity. He’s 5-foot-9, 190 pounds. He pays for pizzas with forged checks, defaulted on a $17,000 car loan and has traveled the country, racking up speeding tickets and thousands...

Read more »