Jake Williams

  • Facebook Nov 8, 2019

    Saudi Recruitment of Twitter Workers Reflects Insider Risks

    Allegations that two former Twitter employees spied on users for the Saudi government have spotlighted the threat posed by insiders who exploit their access to the mountains of sensitive data held by tech companies.

  • Associated Press Apr 17, 2018

    US, UK Say Russia Targets Internet Hardware for Espionage

    Washington and London on Monday jointly accused the Russian government of maliciously targeting global internet equipment for political and economic espionage. The two governments said the Russian operations, which allegedly involve planting malware on internet routers and other equipment, could also lay the foundation for future offensive cyberattacks. A joint statement by the U.S. Department of Homeland Security, the FBI...

  • Associated Press Aug 4, 2017

    $30K Bail Set for British Hacker Who Helped Stop Global WannaCry Ransomware Attack

    A Las Vegas federal judge set bail of $30,000 on Friday for a celebrated young British cybersecurity researcher accused by U.S. prosecutors of creating and distributing malicious software designed to steal banking passwords....
    The attorney for Marcus Hutchins, who has broad support in the information-security community, said the 23-year-old hacker would contest the charges. She said he would not be released...

  • georgia Mar 9, 2017

    WikiLeaks to Help Shield Tech Firms From CIA’s Hacking Tools

    WikiLeaks will work with technology companies to help defend them against the CIA’s hacking tools, founder Julian Assange said Thursday. The move sets up a potential conflict between Silicon Valley firms eager to protect their products and an intelligence agency stung by the radical transparency group’s disclosures. In an online news conference, Assange acknowledged that some companies had asked for...

  • georgia Mar 7, 2017

    WikiLeaks Reveals CIA Files Describing Hacking Tools

    WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung. The documents describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private information of...

Contact Us