hackers   4537

« earlier    

Stewart Brand and the Tools to Make the Whole Earth Better | WIRED
Surveying the landscape that formed and energized WIRED, you can’t avoid the mythic stuff of Brand: He was one of Ken Kesey’s Merry Pranksters, as immortalized in Tom Wolfe’s Electric Kool-Aid Acid Test. He worked with Douglas Engelbart on “The Mother of All Demos,” which in 1968 introduced hypertext, email, the mouse. He created the Whole Earth Catalog and its descendants­; he founded CoEvolution Quarterly.
hackers  activism  inspiration 
2 days ago by ejfox
Nortel hacking went on for years
FEBRUARY 14, 2012 | FT Alphaville | By Joseph Cotterill.
Chinese hackers had undetected access to sensitive Nortel data for almost a decade from 2000, the WSJ reports. The extent to which Nortel, the once-mighty telecoms giant, was compromised shows the lack of corporate defences against hacking. Nortel didn’t disclose its hacking problem to buyers of its assets. Spy software was so deeply embedded in Nortel computers that investigators failed to spot its existence for years. The SEC last year began pushing companies to classify serious cyber attacks on their infrastructure as “material risks” that may require financial disclosure.
China  Chinese  cyberattacks  cyber_security  cyberintrusions  disclosure  hackers  Nortel  regulators  risks  SEC 
22 days ago by jerryking
A practical guide to finding problems to solve in less than 60 minutes
A practical system you can use to extract problems worth solving from your own life and experiences in less than an hour.
bootstrapping  indie  hackers 
4 weeks ago by incredimike

« earlier    

related tags

$1.7  $571m  #rapex  'fortnite'  1980s  2018  2020  2fa  30  40k  5g  8  97  a  accelerators  access  accounts  accused  actionable_information  activism  adamodonnell  affairs  after  agriculture  agtech  alexstamos  algorithms  allow  america  american  and  andreashepard  andrewtsonchev  andy_kessler  anonymity  anonymous  apt  are  arms_race  arrest  as  asktheceo  atlanta  attack  attacked  attacks  auctions  authoritarian  autism  back_doors  backdoor  backorifice  baltimoresun  bank-robbing  banks  bbs  be  begun  behind  beto  betoorourke  big_tech  billion  bitcoin  blackcube  blackhat  blackout  blogs  boeing  book  bootstrapping  breach  breaking  briankrebs  bruceschneier  bug_bounty  business  businessinsider  businesswire  buzzfeed  by  bypass  camera  cameras  campaign  captaincrunch  card  carriecampbell  cars  catastrophic  cdc  charges  charteroftrust  chicagotribune  chilling  china  chinese  cisco  cloud  coach  companies  compromised  computational_thinking  computer  computer_security  computer_vision  computers  conference  conferences  contentmarketing  control  convince  cot  could  countries  coworkers  creators  crime  criminal_justice  crypto  cryptocurrency  culture  curiosity  customers  cyber-security  cyber  cyber_security  cyber_warfare  cyberattack  cyberattacks  cybercrimes  cyberespionage  cyberintrusions  cybermercenaries  cybersec  cybersecurity  cyberweapons  cyberx  damorememo  danielbernstein  dark_side  darkmatter  darktraceindustrial  darpa  data  data_breach  data_breaches  data_leak  david_ignatius  david_sanger  dblooper  decade-long  defcon  defence  department_of_justice  desalination  details  deterrence  different  diligence  disclosure  dissension  dissidents  diy  doj  dollars  domestic_surveillance  down  drones  drug_cartels  dual-use  dublin  due  during  dylanscott  dyndns  earning  eavesdropping  editor  education  ellenpao  elpaso-tx  emails  encryption  entrepreneur  entrepreneurship  epicentre  equation  espionage  essay  ethics  eu  europe  event  experts  exploit  exploits  extortion  facebook  factories  fail  family  fbi  federal  file  files  five_eyes  flaws  flintcapital  foil  for  forrester  forums  founders  free  from  funding  future  futureofwork  futurist  gatwickairport  gdpr  gene_pool  geopolitics  geospatial  germany  global  google  gop  gov  government-linked  government  governments  hack  hacker  hacking  hacktivism  hanacallaghan  harveyweinstein  has  healthcare  heists  hiring  history  hotels  how  https  huawei  hutchinsmarcus  ico  idf  imagery  in  indicts  indie  influence_campaigns  influencers  information  information_flows  information_warfare  infosec  infrastructure  inspiration  instagram  intellectual_property  intelligence  internal_systems  internet  intimate  iot  iran  iranian  ireland  israel  israeli  jakeappelbaum  jamal_khashoggi  jimedwards  johndraper  josephmenn  jquery  kevinwheeler  kids  knew  korea's  korea  korean  l0pht  la_times  last  latest  latin  legal_strategies  lexgill  life  lifehacker  lifehacking  links  logins  losangelestimes  loss  luas  lubbock-tx  m&a  machine_learning  makers  malware  manifesto  manual  mapping  marketing  marriot  marriott  mauritania  may  mbs  men  mercenaries  messages  mexico  microsoft  middle_east  midterms  military  miramax  missingstair  morganmarquisboire  mossad  movies  mspy  nest  netneutrality  new  news  newspapers  nhs  nilgiller  nominet  nortel  north  northkorea  nsa  nso  nuclear  obama  oddities  of  offensive_tactics  office  officials  on  onlinetesting  only  operation  other  over  paganini  passwords  pegasus  peiterzatko  pentagon  personal  personaldata  phds  phishing  phreaking  pierluigi  plugin  poaching  points  poland  policy_tools  politics  practical  pressreleases  pretends  prison  privacy  private  product_recall  proton  public_transport  purposes  put  pwc  quinnnorton  radar  ransomware  rape  rapidalert  rebeccatraister  reference  regulators  remote  report  report:  reportedly  retrocomputing  reuters  reveal  revive  rgcs2016  risks  rocky  routers  rsa  russia-linked  russia  russian  rv320/rv325  sale  samsam  sandiego  sarahjeong  satellites  saudi_arabia  saudis  says  scam  scammers  scientology  search  sec  secrets  securing  security  security_&_intelligence  selling  seo  sergeygribov  serve  servers  services  sexism  sexualassault  sha256  shut  side-hustle  siemens  sierraleone  siliconvalley  small_states  smartphone  smartwatch  social-network  software  spam  spear-phishing  spectrum  spending  sponsored  spyapps  spycraft  spyphones  spyware  start  start_ups  starting  startups  starwood  state  steal  stealing  step7  stole  stolen  strategic_thinking  stuxnet  surveillance  susanfowler  swept  system  tacoland  talktalk  tanjalange  target  targeted  targeting  team  tech  technology  teens  telecommunications  tennessee  texas  tfiles  that  the  theft  theverge  thousands  threat  threat_model  to  tools  tor  tracking  trade_secrets  trump  tv  twitter  two  u.s.  u.s._cyber_command  uber  uk  ukraine  un  unit_8200  unit_9900  united_kingdom  up  upload  us-pres  us  usa  use  using  vc  venture-capital  venturecapital  ventures  vfemail  vox  vulnerabilities  vulnerable  wannacry  war  warfare  water  web  webdev  were  williamsongavin  windows  wipe  wired  with  women  work  wtf  xbox  xi  year  years  youtube  yubikey 

Copy this bookmark:



description:


tags: