Skip to content

Andrew Blake

Andrew Blake was a cybersecurity reporter for The Washington Times. 

Articles by Andrew Blake

U.S. Secretary of State John Kerry delivers a statement on the Iran talks deal at the Vienna International Center in Vienna, Austria Tuesday July 14, 2015.  After 18 days of intense and often fractious negotiation, world powers and Iran struck a landmark deal Tuesday to curb Iran's nuclear program in exchange for billions of dollars in relief from international sanctions ó an agreement designed to avert the threat of a nuclear-armed Iran and another U.S. military intervention in the Muslim world. (Carlos Barria, Pool Photo via AP)

John Kerry: ‘Very likely’ cyberspies read my email

Secretary of State John Kerry said "it is very likely" that his emails are being read by foreign cyberspies and that he purposely drafts correspondence under the assumption that his words are being watched. Published August 12, 2015

This March 27, 2008, file photo, shows the Pentagon in Washington. (AP Photo/Charles Dharapak, File)

Pentagon network back online after cyberattack

The Pentagon says that a Joint Chiefs of Staff computer network taken offline last week after it was discovered to have been infiltrated by hackers is once again up and running. Published August 11, 2015

Google co-founder Larry Page on Monday said that the tech empire will now operate under the umbrella of a new venture called Alphabet, which he will run with longtime partner Sergey Brin. (Associated Press)

Google unveils new parent venture, to be called Alphabet

It's not an easy feat in the tech world to get any bigger than Google. But a new entity unveiled by the Silicon Valley giant's top executives has managed to accomplish the feat instantly this week with the creation of Alphabet, a holding company under which the globe's dominant search engine will operate as part of sweeping new structural corporate changes. Published August 10, 2015

Google Chrome, Google Inc.'s new Web browser, is shown during a news conference at the company's headquarters in Mountain View, Calif., on Tuesday, Sept. 2, 2008. ** FILE **

Rise of ad blockers costing Internet $22B in revenue: report

No one likes wading through a sea of advertisements while surfing the Web, but a report suggests an explosion in the use of ad-blocking software is on course to cost publishers $22 billion in revenue by the end of the year. Published August 10, 2015

This combination made from images provided by Apple Inc. shows new emoji, the cute graphics that punctuate online writing and texts, that will be available with the next iOS update. Working with the Unicode Consortium, the nonprofit organization that sets the standards for the pictograms, Apple Inc. is incorporating more diverse emoji into the developer version of the latest update to its mobile operating system. The iPhone and iPad maker has not said when the update will be available for all users. (AP Photo/Apple Inc.)

Facebook says emojis used more often than LOL

Do animated cat GIFs make you LOL? Or are you more likely to evoke the emoji when entertained on the Web? A new report conducted by researchers with Facebook reveals that the laugh-out-loud acronym might soon go the way of Hamster Dance and Hotmail as Internet users embrace alternative ways of expressing emotions online. Published August 10, 2015

This Tuesday, April 7, 2015, photo shows the instrument panel of a Tesla Model S 70-D electric car during a test drive, in Detroit. Tesla is going after mainstream luxury car buyers by boosting the range, power and price of its low-end Model S. The $75,000 all-wheel-drive 70-D can go a government-certified 240 miles per charge, has 514 horsepower and can go from zero to 60 in 5.2 seconds. (AP Photo/Carlos Osorio)

Hackers detail car, gun exploits at Las Vegas convention

The surge of high-tech smart cars on the roads is a surefire sign the auto industry is embracing the so-called "Internet of things." But at a hacker conference in Las Vegas on Friday, researchers said poor security practices could pose some very serious problems down the road. Published August 7, 2015

(Associated Press/File)

Medical devices too prone to hackers, researchers warn

At a conference in Las Vegas on Thursday, security researchers said that hundreds of common medical devices, ranging from X-ray machines to MRIs, have been vulnerable to attack by hackers. Published August 6, 2015

President Barack Obama speaks at the White House Summit on Cybersecurity and Consumer Protection in Stanford, Calif., Friday, Feb. 13, 2015. (AP Photo/Jeff Chiu)

White House endorses CISA cyber bill amid Senate stalemate

Democrats and Republicans are both applauding the White House for coming out in support of a cybersecurity bill that lawmakers in the Senate are trying to pass before breaking for recess later this week. Published August 5, 2015

In this Feb. 1, 2011, file photo, medical marijuana clone plants are shown at a medical marijuana dispensary in Oakland, Calif. (AP Photo/Jeff Chiu, File)

Cops under fire for pot dispensary raid want surveillance footage tossed

Police officers in California are in hot water for their actions during a recent medical marijuana dispensary raid. An internal affairs probe could become problematic, however, if a lawsuit is successful in keeping surveillance footage from being used against the officers. Published August 5, 2015

In this Tuesday, Sept. 9, 2014, file photo photo, specialists work at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va. (AP Photo/Manuel Balce Ceneta) ** FILE **

CISA showdown: Senate leaders look toward last-minute cybervote

Leadership in the Senate from both sides of the aisle are gunning to get a controversial cybersecurity proposal up for a vote before the start of summer recess, but concerns from lawmakers and tech experts alike may delay attempts to pass the proposal until Congress convenes again in September. Published August 4, 2015

United States Military Academy cadets watch data on computers at the Cyber Research Center at the United States Military Academy in West Point, N.Y., Wednesday, April 9, 2014. The West Point cadets are fending off cyber attacks this week as part of an exercise involving all the service academies. The annual Cyber Defense Exercise requires teams from the five service academies to create computer networks that can withstand attacks from the National Security Agency and the Department of Defense. (AP Photo/Mel Evans)

IT worker gets 10 years for hacking military email

A Florida man contracted to perform IT work for the Pentagon has been sentenced to 10 years in prison after pleading guilty to crimes connected to the hacking of a military email account and theft of sensitive files. Published August 3, 2015

With Donald Trump's presence, candidates will have to go where no previous GOP hopefuls have gone — not because they want to, not because they no longer fear to, but because The Donald has introduced extreme politics to the quadrennial ritual of finding an acceptable party nominee. (Associated Press) defaced by Jon Stewart-loving hacktivists

New poll numbers continue to show Donald Trump as the favorite among Republican voters ahead of next year's presidential election, but the billionaire business tycoon is attracting attention now not just from conservatives, but computer hackers too. Published August 3, 2015

(Associated Press/File)

Anti-virus maker BitDefender admits hacker stole user data

BitDefender, a Romanian software company that supplies Internet security products to hundreds of millions of clients both in the workplace and at home, admits hackers have made off with the usernames and passwords of an undisclosed number of customers. Published July 31, 2015