2 posts tagged with computers by mediareport.
Displaying 1 through 2 of 2.
2013 Science Journalism Award winners from the American Association for the Advancement of Science:
- Large Newspaper: Deep Trouble, about invasive Asian Carp, sewage, the Chicago River and Lake Michigan
- Small Newspaper: Warning: Quake in 60 Seconds, about why California doesn't have a decent early warning system for earthquakes
- Magazine: Attack of the Mutant Pupfish, about genetic integrity vs. genetic restoration in the fight to preserve endangered species
- Television (20 minutes or less): NOVA's profile of computer scientist Adrien Treuille and Foldit, a crowd-sourced protein-folding game
- Television (more than 20 minutes): Smithsonian Channel: Killer in the Caves, about bats and the deadly white-nose fungus
- Radio: NPR and The Center for Public Integrity - As Mine Protections Fail, Black Lung Cases Surge and Black-Lung Rule Loopholes Leave Miners Vulnerable
- Online: An environmental scandal that’s happening right underneath your feet, about the hidden cost of natural gas leaks in pipelines underneath cities
- Children's Science News: Cold Water Corals: Paradise on the Seabed [pdf]
"We’re allowing a whole new level of intelligence in the networks...We can take a copy of everything coming through our switch and dump it off to the FBI."
The Surveillance Catalog: Where Governments Get Their Spying Tools The Wall Street Journal has obtained a "trove" of documents from the secretive retail market in surveillance technology sold to world governments, and has created a searchable database for your enjoyment. "Among the most controversial technologies on display at the conference were essentially computer-hacking tools to enable government agents to break into people's computers and cellphones, log their keystrokes and access their data..." E.g., FinFisher installs malware by sending fake software updates for Blackberry and other devices; VUPEN's Exploits for Law Enforcement Agencies "aim to deliver exclusive exploit codes for undisclosed vulnerabilities" in software from Microsoft, Apple and others. [more inside]