Remove tag linkedin
article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mobile devices. Pushwoosh says it is a U.S. But Reuters found that while Pushwoosh’s social media and U.S.

article thumbnail

Predictions From Last Year: How I Did (2012 Edition)

John Battelle's Searchblog

I hope 2013 keeps pace. Twitter is now seen as an essential partner for every major media company in the world – the hash tag is now a television and movie marketing essential. (Oh, I’ll be as brief as I can with this review – this marks the ninth time I’ve done it. He’s not anymore.).

Marketing 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Let me explain: HIBP Has Always Been Open in Spirit I've already written extensively about the architecture of the system across many of the 128 previous blog posts tagged as Have I Been Pwned. The very second blog post on that tag was about how I used Azure Table Storage to make it so fast and so cheap.

Passwords 145
article thumbnail

The Legitimisation of Have I Been Pwned

Troy Hunt

Transparency has been a huge part of that effort and I've always written and spoken candidly about my thought processes, how I handle data and very often, the mechanics of how I've built the service (have a scroll through the HIBP tag on this blog for many examples of each). Let me now take that one step further and talk about government.