Press

How Police Trace Cellphones in IEDs like the ones in NYC
September 19, 2016 | Andy Greenberg, Wired

Nick Weaver comments on the ease of tracing burner cellphones used in IED attacks, such as the recent attack in New York.

Russian Hackers Get Bolder in Anti-Doping Agency Attack
September 14, 2016 | Andy Greenberg, Wired

A Russian group, Fancy Bear, has taken credit for a recent hacking attack. Nicholas Weaver commented: “We have shown we have no strategy for deterrence in this space, so the Bears are getting Fancy with us.”

"Tech and Bias"
September 8, 2016 | Brian Ellison and Matthew Long-Middleton

Google researchers partnered with a research team from the University of California, Berkeley to analyze the infection and potential remediation of more than 760,000 websites during an 11-month period.

"Google Found 760,935 Compromised Web Sites in a Year"
April 19, 2016 | Team Register, The Register

Google and university researchers say the tech giant found some 760,935 compromised websites across the web during a year-long research effort.

"The FBI May Be Sitting on a Firefox Vulnerability"
April 13, 2016 | Joseph Cox, Motherboard, Vice

In February, the FBI was ordered to provide the full malware code used to hack visitors of a dark web child pornography site to the defense in an affected case. Then the Department of Justice pushed back, and asked the judge to reconsider the decision.

People using fake names on Twitter, Instagram, Foursquare, or Tinder in the hope these accounts can’t be traced back to them are in for a surprise, according to a new report from Columbia University and Google that found that geotagged posts on just two social media apps was enough to link various accounts held by the same person.

"Build Your Own Siri for Arduino"
April 11, 2016 | Richard Wilson, Electronics Weekly

Arduino now has a standalone voice recognition and synthesiser which does not require an internet connection or cloud-based processing.

In an age when technology companies routinely introduce new forms of everyday magic, one problem that remains seemingly unsolved is that of long-form transcription. Sure, voice dictation for documents has been conquered by Nuance’s Dragon software.

"At Berkeley, Students Learn Ins and Outs Of NSA Surveillance"
February 12, 2016 | Sean Sposito, San Francisco Chronicle

This spring, computer science lecturer Nicholas Weaver will give a class of UC Berkeley undergraduates a novel yet practical assignment: build a National Security Agency-style surveillance system.

Pages