Bloomberg

News Opinion Markets Personal Finance Tech Politics Sustainability TV Video Radio

Tech Blog

Security

Photograph by Julian Stratenschulte/AP Photo

Photograph by Julian Stratenschulte/AP Photo

Forget the Batphone. Here Comes the Merkelphone

German Chancellor Angela Merkel is getting a new phone. In fact, she’s buying almost 10,000 of them, for something in the neighborhood of $31 million. This summer, the German government will get the first of about 9,600 hack-proof handsets. The...

Read more »

A technician works at the Uranium Conversion Facility outside the city of Isfahan, 255 miles south of the capital Tehran, Iran, in 2007.

Photograph by Vahid Salemi/AP Photo

A technician works at the Uranium Conversion Facility outside the city of Isfahan, 255 miles south of the capital Tehran, Iran, in 2007.

Stuxnet Had Earlier, Potentially Explosive Version, Symantec Says

The developers behind Stuxnet, the computer worm that damaged an Iranian nuclear plant in 2010, began their work on the malware earlier than previously known and experimented with multiple attack techniques, according to new research by Symantec Corp. Stuxnet, which tampered...

Read more »

The control room at Exelon Corp.'s Limerick nuclear power generating station in Pennsylvania.

Photograph by Bradley C. Bower/Bloomberg

The control room at Exelon Corp.'s Limerick nuclear power generating station in Pennsylvania.

Control-Systems Bugs Jump After Stuxnet Nuclear Plant Attack

Control systems are a dream for hackers and Hollywood script-writers. They run power plants, dams, train lines and traffic lights — and they’re becoming more vulnerable to attacks that can inflict spectacular, physical destruction. According to research released today by...

Read more »

China has been the top source of cyber-attack traffic since the last quarter of 2011, according to a study by Akamai.

Photograph by ImagineChina/Corbis

China has been the top source of cyber-attack traffic since the last quarter of 2011, according to a study by Akamai.

One-Third of Cyber Attack Traffic Originates in China, Akamai Says

About one-third of the world’s cyber attack traffic was traced back to China, according to a report by Akamai Technologies to be published today. Between July and September of last year, about 33 percent of the attacks originated in China, double...

Read more »

Patrons use automated self service booths at the U.S. Postal Service in New York.

Photograph by Jin Lee/Bloomberg

Patrons use automated self service booths at the U.S. Postal Service in New York.

A National Digital ID, Courtesy of the U.S. Postal Service?

  When China passed a new law two weeks ago requiring people to give their real names when signing up for Internet and phone service, it raised alarms over the surveillance implications for the world’s largest population of Web users....

Read more »

Facebook Chief Executive Officer Mark Zuckerberg introduced a video-calling feature to his site last year.

Photograph by David Paul Morris/Bloomberg

Facebook Chief Executive Officer Mark Zuckerberg introduced a video-calling feature to his site last year.

Facebook Fixes Webcam Vulnerability After Receiving Tip

Facebook has patched a security vulnerability that would have allowed hackers to turn on users’ webcams without their knowledge and post the videos to their profiles. The bug was discovered in July by two computer-security researchers in India, according to...

Read more »

AnchorFree's services are popular in countries such as Syria where governments may censor online content.

Photograph by Joseph Eid/AFP via Getty Images

AnchorFree's services are popular in countries such as Syria where governments may censor online content.

AnchorFree to Bundle Mobile and Desktop Security Tools

Silicon Valley startup AnchorFree makes computer-security software that has been downloaded more than 100 million times, often by people in China and the Middle East looking to circumvent Internet censorship. But as personal computing increasingly goes mobile, the company is...

Read more »

Those free Android apps you download may end up costing you more than you know.

Photograph by David Paul Morris/Bloomberg

Those free Android apps you download may end up costing you more than you know.

Attack of the Android Zombies

(Corrected date when Cloudmark published its report.) A scourge of the personal computer has come to the smartphone. Anti-spam company Cloudmark said Dec. 16 that its researchers have spotted what they say is a first-of-its-kind “botnet” comprised of more than...

Read more »

Hackers are increasingly wiring money directly out of victims' online bank accounts - without ever typing a keystroke.

Photograph by Peter Dazeley

Hackers are increasingly wiring money directly out of victims' online bank accounts - without ever typing a keystroke.

How Paper Bills Could Protect You From Cyber Theft

As a computer security reporter, I’m often asked for advice on how to avoid being hacked. I quickly rattle off three safeguards: 1) Use long phrases and symbols in passwords; 2) set up two Web browsers — or better yet, two computers...

Read more »

An Australian medical center is fighting hackers who have encrypted patient records and demanded ransom.

Photograph by Gunter Ziesler

An Australian medical center is fighting hackers who have encrypted patient records and demanded ransom.

Hackers Hold Australian Medical Center’s Records for Ransom

An Australian medical center is facing the possibility that its patients’ electronic medical records may be locked away forever after hackers broke into its computer system and encrypted the files. The hackers who captured the Miami Family Medical Centre’s data...

Read more »