Pundits suggest the "Weinstein moment" — a broader, deeper awareness of abusive conduct, sexual harassment and criminal sexuality — is already fading without significant change. Few of the offenders face consequences worse than losing a gig, and yesterday we learned The New York Times isn't even up to that, letting its celebrity groper keep his job and trotting out Executive Editor Dean Baquet to dismiss his admitted behavior as merely "offensive." Sarah Jeong looks at another example: the hacker community, which did a surprisingly good job of outing its "missing stairs" but has trouble banishing them for good.
In information security, as in many other industries where the accused is a prominent figure, accusations can turn into a competition of social capital, and the accused almost always wins out over their accusers. But in this community, giving an accused rapist a pass has often been framed as a moral imperative with four words: “He does good work.” The assumption is that talent is scarce and sexual misconduct must be tolerated for the good of society. Little to no consideration is given to what we lose from disbelieving victims — their technical and social contributions, any future contributions by people who quite reasonably decide to avoid a toxic culture, and even beyond that, the quiet erosion of trust among bystanders. Complicity leaves a stain on us all.
Wired security reporter Andy Greenberg's latest book is Sandworm (previously), a true-life technothriller that tells the stories of the cybersecurity experts who analyzed and attributed as series of ghastly cyberwar attacks that brought down parts of the Ukrainian power grid, and then escaped the attackers' control and spread all over the world.
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger have published TPM-FAIL: TPM meets Timing and Lattice Attacks, their Usenix security paper, which reveals a pair of timing attacks against trusted computing chips ("Trusted Computing Modules" or TPMs), the widely deployed cryptographic co-processors used for a variety of mission-critical secure computing tasks, from verifying software […]
An Australian woman's creepy, violent ex-boyfriend hacked her phone using stalkerware, then used that, along with her car's VIN number, to hack the remote control app for her car (possibly Landrover's Incontrol app), which allowed him to track her location, stop and start her car, and adjust the car's temperature.
If you’re doing any kind of data work, chances are you’re working in Excel. This venerable platform has evolved beyond its roots as a workhorse spreadsheet creator into an essential tool for data analysts and other high-level number crunchers. Want to brush up on this year’s version of the software? There’s no quicker way than […]
Does your computer gear need an upgrade? Don’t cross your fingers and wait for Christmas. You can get 15% off the final sale price of all these essential accessories now by using the online code BFSAVE15, including gaming mice and computer desks. Wireless Charging Mouse Pad Talk about a space saver. This high-quality mouse pad […]
WordPress is a fantastic tool for building web pages – if you know how to use it. Even with all the accessibility, a lot of the deeper features of WordPress are lost in translation to the average user. Enter WP Page Builder, a tool that not only makes WordPress site design easy but also more […]