Joseph Menn

Send feedback to Joseph Menn

Recent articles for Joseph Menn

Duqu spyware used stolen Foxconn certs  
Jun 16, 2015 | Comment Now 
Attackers target hardware manufacturers to steal digital credentials.
US deployed Stuxnet-style attack against North Korea 
May 31, 2015 | Comment Now 
Foiled by low penetration of the internet.
Obama to demand US organisations share cyber threat data 
Computers remain exposed to boot-up vulnerability 
Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
Suspected Apple hackers arrested in Russia 
Jun 11, 2014 | Comment Now 
Facing two years jail.
Incoming NSA chief touts transparency, defends surveillance 
May 13, 2014 | Comment Now 
First interview since taking on the job.
Former UK spy exec warns NSA tools could fall into criminal hands 
Apple rushes out patch for SSL authentication flaw 
Feb 22, 2014 | Comment Now 
Update: Users urged to run update, and only hook up to trusted connections.
Microsoft reassures nervous foreign business customers 
Dec 6, 2013 | Comment Now 
Follows Google and Yahoo by beefing up encryption.
Hacker 'mercenaries' spy on Japan, South Korea 
Cloud giants claim little impact from Snowden revelations 
Calls to rebuild web security after NSA revelations 
Sep 9, 2013 | Comment Now 
Security agency accused of deliberately undermining standards.
Apple hit by hackers who targeted Facebook 
Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
ITU stalemate could spur national regulation 
Dec 17, 2012 | Comment Now 
Academics warn of inevitable fragmentation of internet controls.
White House review clears Huawei of spy claims 
Oct 18, 2012 | Comment Now 
Equipment let down by "poor programming".
US bank site hackers used advanced botnets 
Oct 4, 2012 | Comment Now 
Largest banks targeted.
US spy agency sponsors DefCon booth 
Jul 30, 2012 | Comment Now 
NSA asks hackers to help secure the internet.
US firms deploy hacking 'strike back' technology 
Jun 18, 2012 | Comment Now 
Controversy brews over 'active defence'.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency