Pundits suggest the "Weinstein moment" — a broader, deeper awareness of abusive conduct, sexual harassment and criminal sexuality — is already fading without significant change. Few of the offenders face consequences worse than losing a gig, and yesterday we learned The New York Times isn't even up to that, letting its celebrity groper keep his job and trotting out Executive Editor Dean Baquet to dismiss his admitted behavior as merely "offensive." Sarah Jeong looks at another example: the hacker community, which did a surprisingly good job of outing its "missing stairs" but has trouble banishing them for good.
In information security, as in many other industries where the accused is a prominent figure, accusations can turn into a competition of social capital, and the accused almost always wins out over their accusers. But in this community, giving an accused rapist a pass has often been framed as a moral imperative with four words: “He does good work.” The assumption is that talent is scarce and sexual misconduct must be tolerated for the good of society. Little to no consideration is given to what we lose from disbelieving victims — their technical and social contributions, any future contributions by people who quite reasonably decide to avoid a toxic culture, and even beyond that, the quiet erosion of trust among bystanders. Complicity leaves a stain on us all.
It's been less than a year since a public-spirited hacker broke into the servers of Florida stalkerware vendor Retina-X, wiping out all the photos and data the company's customers had stolen from other peoples' phones (including their kids' phones) by installing the spying apps Phonesheriff on them.
A pair of researchers from Toronto's storied Citizen Lab (previously) have written an eye-opening editorial and call to action on the ways that repressive states have used the internet to attack dissidents, human rights advocates and political oppositions -- and how the information security community and tech companies have left these people vulnerable.
Radiflow reports that they discovered cryptojacking software -- malware that mines cryptocurrency -- running in the monitoring and control network of an unnamed European water utility, the first such discovery, and a point of serious concern about the security and integrity of critical infrastructure to both targeted and untargeted attacks.
When it comes to redesigning or renovating a living space, envisioning changes before they occur can be tricky for most. Thankfully, the web is home to tools that can remove some of the guesswork, like Live Home 3D Pro for Mac. This app lets you create detailed and furnished floor plans for everything from sheds and […]
For many startups and fledgling businesses, web hosting — and the fees associated with it — can take a sizeable chunk out of the company budget and limit growth down the road. But, that’s not to say there aren’t hosts out there who can get your site online while staying within your budget. Arch Hosting is a […]
The web is a big place, but it’s by no means infinite where domain names are concerned. New domain seekers, in particular, are feeling the burn as .com domain names become increasingly saturated, forcing many to choose a second-rate domain name or rename their brand entirely.Opting for a .tech domain not only affords you a […]