Tag: New York Times
-
New York Times confirms source code compromise
The New York Times confirmed its GitHub repository was breached in January following the leak of its internal source code and data as part …
-
New York Times Spoofed to Hide Russian Disinformation Campaign
“Operation Doppelganger” has convincingly masqueraded as multiple news sites with elaborate fake stories containing real bylines of …
-
API vulnerabilities in Wordle exposed answers, opened the door to potential hacking
A security researcher has uncovered vulnerabilities in the New York Times-owned online game Wordle that not only reveal the solution to the …
-
NYT investigation exposes massive database logging 12M Americans’ movements
The paper detailed the discovery in a lengthy article published this morning. The database came from an unnamed location data company and …
-
NY Investigates Exposure of 885 Million Mortgage Documents
New York regulators are investigating a weakness that exposed 885 million mortgage records at First American Financial Corp. [NYSE:FAF] as …
-
Phones are selling location data from “trusted” apps
A New York Times investigation has found that apps such as GasBuddy and The Weather Channel are among at least 75 companies getting …
-
New York Times profiles one of its own security experts
Last week, the New York Times published a brief profile of privacy and security researcher Runa Sandvik. Well known in the security …
-
New York Times profiles one of the experts who keeps their network secure
Last week, the New York Times published a brief profile of privacy and security researcher Runa Sandvik. Well known in the security …
-
Adrian Lamo, ‘Homeless Hacker’ Who Turned in Chelsea Manning, Dead at 37
Adrian Lamo, the hacker probably best known for breaking into The New York Times‘s network and for reporting Chelsea Manning‘s theft of …
-
New York Times launches Tor Onion Service to overcome censorship and ensure privacy
32 mins ago The New York Times has announced that it is launching a Tor Onion Service version of its website. The new, more secure way to …
-
Is Your Mobile Carrier Your Weakest Link?
More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying on your mobile for that second factor, there has never been more riding on the security of your mobile account. Below are…
-
Chelsea Manning Profiled in New York Times Magazine
Chelsea Manning Profiled in New York Times Magazine Interesting reading. Tags: Read full news article on Schneier on Security
●●●