List of Cyber Security & Hacking articles
-
fp-placeholder-social-share-3-2 Five Predictions for Chinese Censorship in the Year of the Sheep
Near-term prospects for media and Internet freedom in China are grim. Baa.
-
CHAD-NIGERIA-UNREST-CAMEROON Longform’s Picks of the Week
The best stories from around the world.
-
fp-placeholder-social-share-3-2 White House Unveils Call for ‘Strategic Patience’
Critics accuse the administration of being too slow to act in Syria and Russia. In a new strategy document, the White House says that was the plan all along.
-
fp-placeholder-social-share-3-2 Is Unrestricted Internet Access a Modern Human Right?
Technology has left our constitutions out of date. It's time for a reboot.
-
Somali refugees displaced by floods cros Longform’s Picks of the Week
The best stories from around the world.
-
Carbon_Feature1 copy The Hack That Warmed the World
Europe’s carbon-trading market was supposed to be capitalism’s solution to global warming. Instead, it became a playground for gangsters, international crime syndicates, and even two-bit crooks -- who stole hundreds of millions of dollars in pollution credits.
-
fp-placeholder-social-share-3-2 Holder Shadow Looms Large as Senate Considers His Successor
Loretta Lynch went to Capitol Hill to discuss her qualifications to be the next attorney general. She ended up telling lawmakers she isn't Eric Holder.
-
fp-placeholder-social-share-3-2 Undercover Banker: Feds Bust Russian Spy Ring in New York
A three-man spy ring stands accused of carrying out economic espionage on behalf of Moscow.
-
fp-placeholder-social-share-3-2 Malaysia Airlines’ Latest Woe: An Attack by the ‘Cyber Caliphate’
With two of its planes down last year, you’d think Malaysia Airlines might be due for a break. But some hackers apparently disagree.
-
BAHRAIN-POLITICS-OPPOSITION-JUSTICE Longform’s Picks of the Week
The best stories from around the world.
-
fp-placeholder-social-share-3-2 Chinese Websites Deleted One Billion Posts in 2014, State Media Says
The country's campaign against what it calls 'harmful' content is gathering steam.
-
fp-placeholder-social-share-3-2 Meet the Star-Crossed Lovers Behind the Islamic State’s Centcom Hack
The person responsible for the Centcom hack once stole Tony Blaire's address book. He's now married to a British alt-rocker turned jihadist.