Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Jim Finkle

Author

Latest articles by Jim Finkle

Technology
Premera Blue Cross Breached, Medical Information ExposedPremera Blue Cross Breached, Medical Information Exposed
Technology

As many as 11 million customers may be affected.

By Jim Finkle
Technology
Apple, Google Prep Fixes for Newly Uncovered ‘Freak’ Security BugApple, Google Prep Fixes for Newly Uncovered ‘Freak’ Security Bug
Technology

The vulnerability affects the Safari and Android browsers.

By Jim Finkle
Technology
Sony Works for Third Day to Restore PlayStation Network After AttackSony Works for Third Day to Restore PlayStation Network After Attack
Technology

The outage was caused by “high levels of traffic designed to disrupt connectivity and online game play,” otherwise known as a DDoS.

By Jim Finkle
Technology
FBI: Iran Hackers May Target U.S. Energy, Defense FirmsFBI: Iran Hackers May Target U.S. Energy, Defense Firms
Technology

Iranian hackers are increasingly being blamed for sophisticated cyberattacks.

By Jim Finkle
Technology
Iran Hackers Targeted Airlines, Energy Firms: ReportIran Hackers Targeted Airlines, Energy Firms: Report
Technology

Governments are scrambling to better understand Iran’s cyber capabilities.

By Jim Finkle
Technology
Cyber Ring Stole Secrets for Gaming U.S. Stock Market: FireEyeCyber Ring Stole Secrets for Gaming U.S. Stock Market: FireEye
Technology

The operation has compromised sensitive data about dozens of publicly held companies.

By Jim Finkle
Technology
U.S. Government Probes Medical Devices for Possible Cyber FlawsU.S. Government Probes Medical Devices for Possible Cyber Flaws
Technology

The Department of Homeland Security is looking into about two dozen devices for vulnerabilities that could be exploited by hackers.

By Jim Finkle
Technology
“Bash” Software Bug May Pose Bigger Threat Than “Heartbleed”“Bash” Software Bug May Pose Bigger Threat Than “Heartbleed”
Technology

A critical vulnerability in Unix and Linux systems.

By Jim Finkle
Technology
Hackers Can Tap USB Devices, Researcher WarnsHackers Can Tap USB Devices, Researcher Warns
Technology

The vulnerability could enable a new class of attacks that evade all known security protections.

By Jim Finkle