
Hacking your phone to hack your Instagram
How - and why - do people hack social media accounts?
How - and why - do people hack social media accounts?
encryption
Hereās a photo of me trying to do a serious electoral face, and ending up just looking worried [https://www.facebook.com/photo.php?fbid=10158721411170456&set=a.57066280455.133832.699710455&type=3&theater] . But I do think this is a serious election. Iām not
ethics
Remember when I was amused by Twitter deciding that Iām not a journalist [http://www.onemanandhisblog.com/archives/2016/11/journalism-social-media-arbitration.html] or in the media? Well, now Iām profoundly glad. Why? Well, this little Tweet from a WikiLeaks-affiliated group went out on Friday: Of course, many, many
data
Todayās security update for Appleās iOS devices [http://www.nytimes.com/2016/08/26/technology/apple-software-vulnerability-ios-patch.html] is a serious one: > One of the worldās most evasive digital arms dealers is believed to have been taking advantage of three security vulnerabilities in popular Apple products in
cyberattacks
CNN is reporting that there have been cyberattacks targeted at major newspaper journalists [http://edition.cnn.com/2016/08/23/politics/russia-hack-new-york-times-fbi/index.html] : > Hackers thought to be working for Russian intelligence have carried out a series of cyber breaches targeting reporters at The New York Times and other
hacking
Tom Morris does an excellent job of highlighting the flaws in the reporting of the TalkTalk hack [https://tommorris.org/posts/9396]: > Whatās curious though is how the mainstream media have not really talked very much to security experts. Yesterday, I listened to the BBC Today programmeāthis
leweb
The inventor of the web has some serious concerns about its future ā and some amazing tales about its past.
confidentiality
Four good reads that I think are worth your coffee time this morning: * Looking for a job in journalism? Kevin Anderson, who recently landed a great one, has some really excellent advice for preparing for the journalism job interview [http://charman-anderson.com/2014/07/10/journalism-job-seekers-what-to-bring-to-the-interview/?utm_source=rss&
analytics
Dan Barkerās been poking at the tracking javascript on Buzzfeed, and found some very interesting data being captured from quizzes [http://barker.co.uk/buzzfeediswatching]: > In other words, if I had access to the BuzzFeed Google Analytics data, I could query data for people who got to the
Last night I switched the e-mail hosting provider behind @onemanandhisblog.com from Gmail to Hoverās e-mail service [https://www.hover.com/email]. Why? Two reasons mainly: * I very rarely use webmail. Maybe Iām just showing my internet age, but the majority of my e-mail is done through Mail.
Journalism
Microsoft accesses a bloggerās e-mail without permission to track the source of a leak [http://recode.net/2014/03/20/blogger-psa-dont-use-microsofts-web-mail-to-receive-microsoft-leaks/] : > One of the revelations in this weekās case of a Microsoft worker who leaked pre-release Windows 8 software was that Microsoft accessed the Hotmail account of
online identity
Many of you will have seen something like this when you visit my blog today: [http://www.onemanandhisblog.com/archives/assets_c/2014/02/fight-back-2-3519.html] And Iām far from alone. Hereās Antony Mayfieldās blog [http://www.antonymayfield.com/2014/02/11/against-mass-surveillance-what-will-you-do-today/] : [http://www.onemanandhisblog.com/