Kevin Poulsen

Type: Person
Name: Kevin Poulsen
First reported Sep 15 2014 - Updated Sep 15 2014 - 1 reports

#SafeSource NZ - A secure way to share the truth

Blogpost by Nathan Argent - September 15, 2014Dirty politics and a dirty environment go hand in hand. Our country’s future as a fairer, cleaner, more prosperous place is being threatened by backroom deals, corporate cronyism and a lack of transparenc ... [Published Scoop - Sep 15 2014]
First reported Aug 25 2014 - Updated Aug 25 2014 - 1 reports

Hack exposes Secret app confessions

Anonymous confessions posted on a popular app, called “ Secret ,” were susceptible to being exposed via a hack. The attack, detailed Friday by Wired , was discovered by white hat hacker Ben Caudill, who disclosed the vulnerability to the app maker under ... [Published SC Magazine US - Aug 25 2014]
First reported Aug 22 2014 - Updated Aug 23 2014 - 2 reports

Secret CEO: Well...You're Not ALWAYS Completely Anonymous Or Untraceable On Our App

SecretHere's a screenshot of the app SecretThe CEO of anonymous sharing app "Secret" wants users to know that they're not guaranteed anonymity."We do not say that you will be completely safe at all times and be completely anonymous," CEO David Byttow ... [Published Business Insider - Aug 22 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 2 reports

Scientists Want to Build a Tomato That Grows 24/7 and Other Fascinating News on the Web

1. Attack of the Killer TomatoesTen billion. That’s a lot of mouths to feed. Providing nourishment to that many people could be a requirement by the end of the century. As The New Yorker’s Michael Specter explains, “sustaining that many people will require ... [Published Time - Aug 22 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Secret CEO: Well...You're Not ALWAYS Completely Anonymous Or Untraceable On Our App

The CEO of anonymous sharing app "Secret" wants users to know that they're not guaranteed anonymity. "We do not say that you will be completely safe at all times and be completely anonymous," CEO David Byttow told Wired's Kevin Poulsen. The idea of the ... [Published Atlanta Journal And Constitution - Aug 22 2014]
Entities: Kevin Poulsen
First reported Aug 07 2014 - Updated Aug 08 2014 - 1 reports

Online privacy – FBI ‘using malware’ to track site visitors

For several years, FBI agents have been taking an unusual approach to detective work online – using malware against suspects who have not been proven guilty, just visited the wrong site. Wired’s Kevin Poulsen has a detailed analysis of the attacks ... [Published We Live Security - Aug 07 2014]
First reported Aug 06 2014 - Updated Aug 07 2014 - 2 reports

With 'Operation Torpedo', FBI Malware Infiltrates Dark Web

Zach Dorland/FlickrJust when you thought it was safe to surf the SilkRoad-replacement sites...  Wired's Kevin Poulsen reportedthis week on the FBI  using hacker-like techniques to trackTor users, in an effort the agency calls "Operation Torpedo." Sofar ... [Published REASON Online - Aug 06 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 2 reports

The Switchboard: Over a billion Internet passwords are in the hands of Russian cybercriminals

No, this is not what hacking really looks like. (REUTERS/Kacper Pempel/Files) Published every weekday, the Switchboard is your morning helping of hand-picked stories from The Switch team. Russian Gang Amasses Over a Billion Internet Passwords ... [Published Post Tech - Aug 06 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

How the FBI Could Get in Your Computer

First reported Jul 08 2014 - Updated Jul 09 2014 - 1 reports

How Google Map Hackers Can Destroy a Business

First reported Jun 02 2014 - Updated Jun 03 2014 - 2 reports

Trademark Holder Sends Cease-And-Desist To Zazzle Over Products Using 3,000-Year-Old Greek Letter

Over the past few days, an IP battle has erupted at print-on-demand service Zazzle over a 3,000-year-old Greek letter . New York artist Paul Ingrisano was granted a trademark for the following symbol, apparently in reference to his initials. This ... [Published Techdirt - Jun 02 2014]
First reported May 21 2014 - Updated May 22 2014 - 3 reports

Snowden Ran A Major Tor Exit Relay, Hosted CryptoParty In Hawaii While Waiting For Greenwald To Reply

Kevin Poulsen over at Wired has the interesting story of how Ed Snowden both ran a CryptoParty in Hawaii while waiting to hear back from Glenn Greenwald after his first email, and also apparently hosted a Tor node. In October of 2012, we wrote about ... [Published Techdirt - May 21 2014]

Quotes

The CEO of anonymous sharing app "Secret" wants users to know that they're not guaranteed anonymity. "we do not say that you will be completely safe at all times and be completely anonymous" CEO David Byttow told Wired's Kevin Poulsen...

More Content

All (31) | News (10) | Reports (0) | Blogs (21) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
#SafeSource NZ - A secure way to share the truth [Published Scoop - Sep 15 2014]
Refuse to be Silenced [Published Editor & Publisher - Sep 08 2014]
Your secrets may not be safe with anonymous sha... [Published Guardian.co.uk - Aug 26 2014]
Hack exposes Secret app confessions [Published SC Magazine US - Aug 25 2014]
Scientists Want to Build a Tomato That Grows 24... [Published Time - Aug 22 2014]
Scientists Want to Build a Tomato That Grows 24... [Published TIME.com - Aug 22 2014]
Secret CEO: Well...You're Not ALWAYS Completely... [Published Atlanta Journal And Constitution - Aug 22 2014]
Secret CEO: Well...You're Not ALWAYS Completely... [Published Business Insider - Aug 22 2014]
Secret app takes mere minutes to hack, revealin... [Published We Live Security - Aug 22 2014]
Week in security: FBI malware, billion password... [Published We Live Security - Aug 08 2014]
Online privacy – FBI ‘using malware’ to track s... [Published We Live Security - Aug 07 2014]
With 'Operation Torpedo', FBI Malware Infiltrat... [Published REASON Online - Aug 06 2014]
With 'Operation Torpedo', FBI Malware Infiltrat... [Published Hit & Run - Aug 06 2014]
The Switchboard: Over a billion Internet passwo... [Published Post Tech - Aug 06 2014]
The Switchboard: Over a billion Internet passwo... [Published Faster Forward - Aug 06 2014]
FBI used drive-by downloads to track child porn... [Published Sophos Anti Virus - Aug 06 2014]
How the FBI Could Get in Your Computer [Published RealClearPolitics - Homepage - Aug 05 2014]
How Google Map Hackers Can Destroy a Business [Published RealClearPolitics - Homepage - Jul 08 2014]
How to Communicate Securely With the Media [Published Firedoglake - Jun 12 2014]
Guardian Installed SecureDrop Outside The UK, D... [Published Techdirt - Jun 06 2014]
Trademark Holder Sends Cease-And-Desist To Zazz... [Published Techdirt - Jun 02 2014]
A Brooklyn Artist Trademarked The 'Pi' Symbol, ... [Published Clusterstock - Jun 02 2014]
Hackers in chains: 13 of the biggest US prison ... [Published FierceITSecurity - May 21 2014]
Snowden Ran A Major Tor Exit Relay, Hosted Cryp... [Published Techdirt - May 21 2014]
Snowden taught others to use encryption while p... [Published Post Tech - May 21 2014]
Snowden taught others to use encryption while p... [Published Faster Forward - May 21 2014]
20 Books Cybersecurity Professionals Should Rea... [Published Security Bloggers Network - Apr 09 2014]
Switchboard: Google asks the Supreme Court to t... [Published Faster Forward - Apr 02 2014]
Switchboard: Google asks the Supreme Court to t... [Published Post Tech - Apr 02 2014]
[tt] (cypherpunks) TorMail completely compromis... [Published TranshumanTech - Jan 31 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Scientists Want to Build a Tomato That Grows 24... [Published TIME.com - Aug 22 2014]
1. Attack of the Killer Tomatoes Ten billion. That’s a lot of mouths to feed. Providing nourishment to that many people could be a requirement by the end of the century. As The New Yorker’s Michael Specter explains, “sustaining that many people will ...
Secret app takes mere minutes to hack, revealin... [Published We Live Security - Aug 22 2014]
Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the owner of those secrets. As Wired reports ...
Week in security: FBI malware, billion password... [Published We Live Security - Aug 08 2014]
With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week in the world of security – with hacks ranging from the surreal to the terrifying demonstrated, and vicious argument over the week’s most controversial presentation ...
Online privacy – FBI ‘using malware’ to track s... [Published We Live Security - Aug 07 2014]
For several years, FBI agents have been taking an unusual approach to detective work online – using malware against suspects who have not been proven guilty, just visited the wrong site. Wired’s Kevin Poulsen has a detailed analysis of the attacks ...
With 'Operation Torpedo', FBI Malware Infiltrat... [Published Hit & Run - Aug 06 2014]
<p><img alt="" height="185" src="http://cloudfront-media.reason.com/mc/_external/2014_08/onion-under-scrutiny-zach-dorl.jpg?h=185&w=300" title="Onion under scrutiny|||Zach Dorland/Flickr" width="300" style="float: right;"/&gt; Just when you thought it ...
1 2 3 4 5
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.