Bloomberg

News Opinion Markets Personal Finance Tech Politics Sustainability TV Video Radio

Tech Blog

Posts tagged: hackers

Hackers like to target Java, the ubiquitous software that’s installed on billions of computers and mobile phones worldwide.

Photograph by Getty Images

Hackers like to target Java, the ubiquitous software that’s installed on billions of computers and mobile phones worldwide.

Hackers’ Exploits of Java Renews Debate About Pace of Security Fixes

Oracle issued an emergency fix today for vulnerabilities in its Java software about four months after Security Explorations, a security firm, warned the company about the bugs. The delay in providing a fix allowed more than 100,000 computers to get...

Read more »

Vulnerabilities in automobiles' computer systems are drawing attention from hackers.

Photograph by Steve Hockstein/Bloomberg

Vulnerabilities in automobiles' computer systems are drawing attention from hackers.

Students Get an Education on How to Break Into Latest Automobiles

Inside a Maryland warehouse last week, Tiffany Rad was teaching a few dozen young people how to break into cars. It was nothing sinister — Rad is a security professional with a cool job: She hacks into cars full-time for...

Read more »

The incident showcases an unsettling new strain of opportunism that's emerging as criminals try to exploit digital records.

Photograph by Steve Wisbauer

The incident showcases an unsettling new strain of opportunism that's emerging as criminals try to exploit digital records.

Hackers Steal, Encrypt Health Records and Hold Data for Ransom

As more patient records go digital, a recent hacker attack on a small medical practice shows the big risks involved with electronic files. The Surgeons of Lake County, located in the affluent northern Illinois suburb of Libertyville, revealed last month...

Read more »

Attendees arrive during the  Black Hat conference at Caesar's Palace in Las Vegas on Wednesday.

Photographer by Jacob Kepler/Bloomberg

Attendees arrive during the Black Hat conference at Caesar's Palace in Las Vegas on Wednesday.

Apple’s Black Hat Talk Draws Crowd, But Breaks Little Ground

(This post was updated to clarify Microsoft’s involvement with Black Hat in the last graph.) A few minutes into Apple’s much-anticipated presentation at the Black Hat hacking conference in Las Vegas, it became clear that the secretive company intended on...

Read more »

The radio frequency of a newly-installed smart meter is checked in Burlington, Vermont.

Photograph by Toby Talbot/AP Photo

The radio frequency of a newly-installed smart meter is checked in Burlington, Vermont.

Smart-Meter Hacker to Give Talk He Shelved Under Industry Pressure

Few things are as scandalous at computer-hacker conferences as the presentations that don’t happen. Hackers face constant legal threats for their discoveries. So when someone plans to disclose an important security hole, but is forced to cancel the talk because...

Read more »

Attendees are seen through a Black Hat logo during the Black Hat and Defcon hacker conferences in Las Vegas.

Photograph by Jae C. Hong/AP Photo

Attendees are seen through a Black Hat logo during the Black Hat and Defcon hacker conferences in Las Vegas.

Apple Warms Up to Hackers, Plans Presentation at Black Hat

(This post was updated with Apple declining to comment.) In the 15 years that computer hackers have gathered in Las Vegas for the Black Hat  conference, an event where unknowns can become stars and tech heavyweights are skewered for security...

Read more »

The allure of hacking back is growing as digital espionage and trade-secret theft have become rampant.

Photograph by Photomorgana

The allure of hacking back is growing as digital espionage and trade-secret theft have become rampant.

Is Hacking in Self-Defense Legal? It Depends, Says Army Cyber Lawyer

When Robert Clark meets with large corporations and government agencies that have been hacked, many express the same feeling. They want revenge. But the impulse to strike back is fraught with legal danger, said Clark, operational attorney for the U.S....

Read more »

Jay Radcliffe displays a radio device he uses to perform an attack on an insulin pump at the annual Black Hat conference last year.

Photograph by Isaac Brekken/AP Photo

Jay Radcliffe displays a radio device he uses to perform an attack on an insulin pump at the annual Black Hat conference last year.

Insulin Pump Hacker, Medical Device Maker Come to the Table

When Jay Radcliffe went public last year with his discovery that some insulin pumps can be hacked, he didn’t expect it would take a year to get a meeting with the company that makes the vulnerable products. Yet that’s about...

Read more »


Trojan.Milicenso is forcing infected computers to print out endless streams of gibberish until the paper runs out.

Photograph by Leland Bobbe

Trojan.Milicenso is forcing infected computers to print out endless streams of gibberish until the paper runs out.

When Hackers Fumble: ‘Printer Bomb’ Noisily Announces Attack

As the malware known as Flame has shown, hacking attacks are so sophisticated nowadays that it can be nearly impossible to detect whether your computer has been compromised. Unless it’s malicious software called Trojan.Milicenso. The malware isn’t new. It was...

Read more »