Kevin Poulsen

Type: Person
Name: Kevin Poulsen
First reported Oct 22 2014 - Updated Oct 22 2014 - 1 reports

Behind Cripple Creek's lure

In 2009, a couple of addicted gamblers in Las Vegas discovered what every slot player dreams of: a way to beat the system.As Wired magazine reported on Oct. 7, Vegas resident John Kane stumbled upon a programming flaw in the ubiquitous Game King video ... [Published Colorado Springs Independent - Oct 22 2014]
First reported Oct 17 2014 - Updated Oct 17 2014 - 1 reports

Zero Day Weekly: Drupal disaster, POODLE, Ebola phishing scams

Summary: A collection of notable security news items for the week ending October 17, 2014. Covers enterprise, controversies, reports and more.Welcome to Zero Day's , our roundup of notable security news items for the week ending October 17, 2014. Covers ... [Published ZDNet - Oct 17 2014]
First reported Oct 17 2014 - Updated Oct 17 2014 - 2 reports

Hacking a Video Poker Machine

Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine. ... [Published Security Bloggers Network - Oct 17 2014]
Entities: Poker, Kevin Poulsen
First reported Oct 16 2014 - Updated Oct 16 2014 - 1 reports

How Anonabox Went From Privacy Savior to Scam in Less Than a Week

The narrative around a hot new device promising easy security for internet users is quickly unraveling.The creators of the "Anonabox" describe it as a “100 percent open source” networking device designed to run the anonymizing service Tor.The idea,its ... [Published Motherboard Magazine - Oct 16 2014]
First reported Oct 11 2014 - Updated Oct 11 2014 - 2 reports

Winning (and losing) big on a video poker bug

Recommended Reading highlights the best long-form writing on technology and more in print and on the web. Some weeks, you'll also find short reviews of books that we think are worth your time. We hope you enjoy the read. Finding a Video Poker Bug Made ... [Published DailyMe.Com - Oct 11 2014]
First reported Oct 09 2014 - Updated Oct 09 2014 - 1 reports

What Newspapers Think Gay Marriage Looks Like, Gritty “Adventure Time” and More #Mustreads

govicinity via iStockGood morning!Here is some content for your perusal, brought to you by  Re/code :On Monday, the Supreme Court gave five states the go-ahead to legalize gay marriages. Bloomberg Politics looked at the covers of 35 newspapers in those ... [Published Recode - Oct 09 2014]
First reported Oct 09 2014 - Updated Oct 09 2014 - 1 reports

Microsoft : Boot up: Gates v Ballmer, cyber-murder?, Apple v data, Windows 10 FAQs

A burst of 10 links for you to chew over, as picked by the Technology teamThe Empire reboots >> Vanity FairHuge in-depth profile and history of Gates, Ballmer, Nadella and Microsoft :"The worst work I did was from 2001 to 2004," says Ballmer. "And ... [Published 4 Traders - Oct 09 2014]
First reported Oct 06 2014 - Updated Oct 06 2014 - 1 reports

Environmentally-friendly businesses add strength to Boston’s sustainability efforts

Energy-guzzlers and pollution-emitters are some names that may get thrown around when placing businesses in context of the environment. But with the continued drainage of natural resources due to inefficient operating methods, the social and economic ... [Published Daily Free Press - Oct 06 2014]
First reported Aug 07 2014 - Updated Aug 08 2014 - 1 reports

Online privacy – FBI ‘using malware’ to track site visitors

For several years, FBI agents have been taking an unusual approach to detective work online – using malware against suspects who have not been proven guilty, just visited the wrong site. Wired’s Kevin Poulsen has a detailed analysis of the attacks ... [Published We Live Security - Aug 07 2014]
First reported Aug 06 2014 - Updated Aug 07 2014 - 2 reports

With 'Operation Torpedo', FBI Malware Infiltrates Dark Web

Zach Dorland/FlickrJust when you thought it was safe to surf the SilkRoad-replacement sites...  Wired's Kevin Poulsen reportedthis week on the FBI  using hacker-like techniques to trackTor users, in an effort the agency calls "Operation Torpedo." Sofar ... [Published REASON Online - Aug 06 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 2 reports

The Switchboard: Over a billion Internet passwords are in the hands of Russian cybercriminals

No, this is not what hacking really looks like. (REUTERS/Kacper Pempel/Files) Published every weekday, the Switchboard is your morning helping of hand-picked stories from The Switch team. Russian Gang Amasses Over a Billion Internet Passwords ... [Published Post Tech - Aug 06 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

How the FBI Could Get in Your Computer

More Content

All (30) | News (11) | Reports (0) | Blogs (19) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Behind Cripple Creek's lure [Published Colorado Springs Independent - Oct 22 2014]
Zero Day Weekly: Drupal disaster, POODLE, Ebola... [Published ZDNet - Oct 17 2014]
Hacking a Video Poker Machine [Published Security Bloggers Network - Oct 17 2014]
Hacking a Video Poker Machine [Published Schneier on Security - Oct 17 2014]
How Anonabox Went From Privacy Savior to Scam i... [Published Motherboard Magazine - Oct 16 2014]
Winning (and losing) big on a video poker bug [Published DailyMe.Com - Oct 11 2014]
Recommended Reading: Winning (and losing) big o... [Published Engadget - Oct 11 2014]
What Newspapers Think Gay Marriage Looks Like, ... [Published Recode - Oct 09 2014]
Microsoft : Boot up: Gates v Ballmer, cyber-mur... [Published 4 Traders - Oct 09 2014]
Environmentally-friendly businesses add strengt... [Published Daily Free Press - Oct 06 2014]
Your secrets may not be safe with anonymous sha... [Published Guardian.co.uk - Aug 26 2014]
Scientists Want to Build a Tomato That Grows 24... [Published TIME.com - Aug 22 2014]
Secret app takes mere minutes to hack, revealin... [Published We Live Security - Aug 22 2014]
Week in security: FBI malware, billion password... [Published We Live Security - Aug 08 2014]
Online privacy – FBI ‘using malware’ to track s... [Published We Live Security - Aug 07 2014]
With 'Operation Torpedo', FBI Malware Infiltrat... [Published REASON Online - Aug 06 2014]
With 'Operation Torpedo', FBI Malware Infiltrat... [Published Hit & Run - Aug 06 2014]
The Switchboard: Over a billion Internet passwo... [Published Post Tech - Aug 06 2014]
The Switchboard: Over a billion Internet passwo... [Published Faster Forward - Aug 06 2014]
How the FBI Could Get in Your Computer [Published RealClearPolitics - Homepage - Aug 05 2014]
How Google Map Hackers Can Destroy a Business [Published RealClearPolitics - Homepage - Jul 08 2014]
How to Communicate Securely With the Media [Published Firedoglake - Jun 12 2014]
Guardian Installed SecureDrop Outside The UK, D... [Published Techdirt - Jun 06 2014]
Trademark Holder Sends Cease-And-Desist To Zazz... [Published Techdirt - Jun 02 2014]
A Brooklyn Artist Trademarked The 'Pi' Symbol, ... [Published Clusterstock - Jun 02 2014]
Hackers in chains: 13 of the biggest US prison ... [Published FierceITSecurity - May 21 2014]
Snowden Ran A Major Tor Exit Relay, Hosted Cryp... [Published Techdirt - May 21 2014]
Snowden taught others to use encryption while p... [Published Post Tech - May 21 2014]
Snowden taught others to use encryption while p... [Published Faster Forward - May 21 2014]
20 Books Cybersecurity Professionals Should Rea... [Published Security Bloggers Network - Apr 09 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
IT
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Hacking a Video Poker Machine [Published Security Bloggers Network - Oct 17 2014]
Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine. ...
Hacking a Video Poker Machine [Published Schneier on Security - Oct 17 2014]
Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine. ...
Scientists Want to Build a Tomato That Grows 24... [Published TIME.com - Aug 22 2014]
1. Attack of the Killer Tomatoes Ten billion. That’s a lot of mouths to feed. Providing nourishment to that many people could be a requirement by the end of the century. As The New Yorker’s Michael Specter explains, “sustaining that many people will ...
Secret app takes mere minutes to hack, revealin... [Published We Live Security - Aug 22 2014]
Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the owner of those secrets. As Wired reports ...
Week in security: FBI malware, billion password... [Published We Live Security - Aug 08 2014]
With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week in the world of security – with hacks ranging from the surreal to the terrifying demonstrated, and vicious argument over the week’s most controversial presentation ...
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.