Bloomberg

News Opinion Markets Personal Finance Tech Politics Sustainability TV Video Radio

Tech Blog

Posts tagged: Security

A technician works at the Uranium Conversion Facility outside the city of Isfahan, 255 miles south of the capital Tehran, Iran, in 2007.

Photograph by Vahid Salemi/AP Photo

A technician works at the Uranium Conversion Facility outside the city of Isfahan, 255 miles south of the capital Tehran, Iran, in 2007.

Stuxnet Had Earlier, Potentially Explosive Version, Symantec Says

The developers behind Stuxnet, the computer worm that damaged an Iranian nuclear plant in 2010, began their work on the malware earlier than previously known and experimented with multiple attack techniques, according to new research by Symantec Corp. Stuxnet, which tampered...

Read more »

The control room at Exelon Corp.'s Limerick nuclear power generating station in Pennsylvania.

Photograph by Bradley C. Bower/Bloomberg

The control room at Exelon Corp.'s Limerick nuclear power generating station in Pennsylvania.

Control-Systems Bugs Jump After Stuxnet Nuclear Plant Attack

Control systems are a dream for hackers and Hollywood script-writers. They run power plants, dams, train lines and traffic lights — and they’re becoming more vulnerable to attacks that can inflict spectacular, physical destruction. According to research released today by...

Read more »

China has been the top source of cyber-attack traffic since the last quarter of 2011, according to a study by Akamai.

Photograph by ImagineChina/Corbis

China has been the top source of cyber-attack traffic since the last quarter of 2011, according to a study by Akamai.

One-Third of Cyber Attack Traffic Originates in China, Akamai Says

About one-third of the world’s cyber attack traffic was traced back to China, according to a report by Akamai Technologies to be published today. Between July and September of last year, about 33 percent of the attacks originated in China, double...

Read more »

Patrons use automated self service booths at the U.S. Postal Service in New York.

Photograph by Jin Lee/Bloomberg

Patrons use automated self service booths at the U.S. Postal Service in New York.

A National Digital ID, Courtesy of the U.S. Postal Service?

  When China passed a new law two weeks ago requiring people to give their real names when signing up for Internet and phone service, it raised alarms over the surveillance implications for the world’s largest population of Web users....

Read more »

Medical devices such as mammography machines can be vulnerable to hacking attacks.

Photograph by Gary Gershoff/Getty Images

Medical devices such as mammography machines can be vulnerable to hacking attacks.

Many Doctors Don’t Secure Medical Devices From Hackers, Study Finds

Your doctor’s office likely doesn’t have any digital security for its mammography machines, heart pumps and other devices that are vulnerable to hacking, according to a new study. In a survey of 80 health care organizations in the U.S., the...

Read more »

Medical identity theft affected an estimated 1.5 million people in the U.S., according to the Ponemon Institute.

Photograph by Reza Estakhrian

Medical identity theft affected an estimated 1.5 million people in the U.S., according to the Ponemon Institute.

How Medical Identity Theft Can Give You a Decade of Headaches

Arnold Salinas knows a lot about the person who stole his identity. He’s 5-foot-9, 190 pounds. He pays for pizzas with forged checks, defaulted on a $17,000 car loan and has traveled the country, racking up speeding tickets and thousands...

Read more »

The vote-by-e-mail idea came about as a result of the destruction leveled on New Jersey by Hurricane Sandy.

Photograph by Paul J. Richards/AFP via Getty Images

The vote-by-e-mail idea came about as a result of the destruction leveled on New Jersey by Hurricane Sandy.

New Jersey Election Official Uses Hotmail to Collect Voter Ballots

As if voting by e-mail weren’t insecure enough, an election official in New Jersey has now instructed citizens who can’t get their ballots through to swamped government e-mail servers to send them instead to his personal Hotmail account, according to BuzzFeed. You...

Read more »

The FBI informed Coca-Cola that sensitive deal information had been taken from the computer account of Paul Etchells.

Photograph by Qilai Shen/Bloomberg

The FBI informed Coca-Cola that sensitive deal information had been taken from the computer account of Paul Etchells.

How a Coca-Cola Exec Fell for a Hacker’s E-mail Trick

In the annals of what-was-I-thinking moments in computer security, this has to be one of the most gobsmacking. According to a Bloomberg News investigation of a series of undisclosed corporate data breaches, Coca-Cola was deeply penetrated by hackers in 2009 in...

Read more »

Some of the most aggressive Android apps are programs purporting to be affiliated with popular franchises such as Facebook and Zynga, Bit9 found.

Photograph by Chris Ratcliffe/Bloomberg

Some of the most aggressive Android apps are programs purporting to be affiliated with popular franchises such as Facebook and Zynga, Bit9 found.

100,000 Android Apps Collect Too Much Data, Security Firm Finds

That Angry Birds wallpaper app you’ve downloaded is doing more than decorating your smartphone screen — in the background, it’s also accessing your device’s GPS data, which tracks your location. As unseemly as that sounds, it’s not uncommon. Security firm...

Read more »

Hackers are attacking businesses, such as banks and auto dealers, that rely on reporting agencies for background credit checks.

Photograph by Mike Kemp/Getty Images

Hackers are attacking businesses, such as banks and auto dealers, that rely on reporting agencies for background credit checks.

Experian Customers Unsafe as Hackers Steal Credit Report Data

When hackers broke into computers at Abilene Telco Federal Credit Union last year, they gained access to sensitive financial information on people from far beyond the bank’s home in west-central Texas. The cyberthieves broke into an employee’s computer in September...

Read more »