Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Computer Security: Experts and Sources
Sources Directory - Subject Index


Sources Select Resources

The FBI Can Bypass Encryption
Why Cyber Security is a Magic Act
Blunden, Bill
Article
2014
CounterPunch
How to Leak to The Intercept
Lee, Micah
Article
2015
The Intercept
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
The Motherboard Guide to Not Getting Hacked
Motherboard Staff
Article
2017
VICE
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb...
Passphrases That You Can Memorize - But That Even the NSA Can't Guess
Lee, Micah
Article
2015
The Intercept
A passphrase is like a password, but longer and more secure. In essence, it's an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer secu...
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
Fishman, Andrew; Marquis-Boire, Morgan
Article
2015
The Intercept
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Article
2012
The Guardian
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Watch your attachments: Microsoft Office bug lets hackers take over computers
Article
2014
RT
A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr...
Why you shouldn't trust Geek Squad ever again
The government reportedly pays Geek Squad technicians to dig through your PC
Patrizio, Andy
Article
2017
Network World
The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gen...
With Virtual Machines, Getting Hacked Doesn't Have To Be That Bad
Lee, Micah
Article
2015
The Intercept
Lee explains how to install and use a virtual machine, a fake computer running inside the real computer.

Media



Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.