Be Careful of Your Swipes, You May Not Be the Only One Watching You Swipe

Tinder’s decision not to use the security feature, HTTPS, may allow hackers and random individuals see your potential matches. Additionally, hackers may be able to inject images or malicious content into a user’s app feed in which other users may be able to see. Why would a dating app, such as Tinder, not act in the first place to securely encrypt a user’s information to protect his or her privacy?… Read More Be Careful of Your Swipes, You May Not Be the Only One Watching You Swipe

Have the C.I.A.’s Hacking Capabilities Gone Too Far?

Wikileaks has recently set its sights on the Central Intelligence (“C.I.A.”) with its latest release of what has been deemed the largest C.I.A. document leak in history. The leaked documents reveal information concerning the hacking tools that the C.I.A. utilizes to hack smartphones, computers, and Smart-TVs. This creates a problem for the C.I.A. who uses these hacking tools to engage in foreign espionage. Now the real question for debate is whether these tools give the C.I.A. hacking capabilities that go beyond their mandated powers.
Read More Have the C.I.A.’s Hacking Capabilities Gone Too Far?

50 Shades Darkode: The Newest Prosecution for an International Cyber Crime Ring

In 2015, the United States and about twenty other countries successfully pulled off a massive crackdown of an international cyber crime site. Since 2015, federal judges across the United States have been handing out sentences for the individuals charged and convicted, and most recently, a twenty-year-old college student was sentenced with his connection to the crime site, Darkoke.
Read More 50 Shades Darkode: The Newest Prosecution for an International Cyber Crime Ring

The Misunderstood Hacker and the Violation of His Rights

POSTED BY Abner Pinedo Many frown upon the term “hacker” in our society. Corporations view hackers as the enemies who pry into protected computer source codes by circumventing copyright protecting technologies. However, hackers don’t view themselves as the enemy, but more of a public necessity in society. Their hacks and circumventing acts have brought upon… Read More The Misunderstood Hacker and the Violation of His Rights