William Turton, Bloomberg

William Turton


New York, NY, United States

Contact William

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

  • Unknown
  • Bloomberg
  • Cashay
  • Washington Post
  • BQ Prime
  • The Outline
  • Gizmodo
  • Gizmodo Australia
  • Gizmodo UK
  • kinja.com
  • The Daily Dot
  • and more…

Past articles by William:

Top White House Cybersecurity Official Plans to Step Down

The US’s first national cyber director, Chris Inglis, is planning to step down in the coming months, according to a person familiar with the matter. → Read More

Twitter Suspends the Accounts Tracking Musk’s Jet and The Man Behind It

(Bloomberg) -- Twitter Inc. suspended multiple accounts that track the locations of private jets using publicly available flight data, including one that... → Read More

NSA Watchdog Concluded One Analyst’s Surveillance Project Went Too Far

Newly unearthed inspector general’s report is coda to Snowden-era controversy over NSA surveillance methods. → Read More

Teen Suspected by Cyber Researchers of Being Lapsus$ Mastermind

Cybersecurity researchers investigating a string of hacks against technology companies, including Microsoft Corp. and Nvidia Corp., have traced the attacks to a 16-year-old living at his mother’s house near Oxford, England. → Read More

The White House Is Worried About Open Source Software Security

A flaw found in a popular piece of software illustrates one danger of volunteer-run development projects. → Read More

The Former NSA Official Vying to Steer Biden’s Cyber Policy

Anne Neuberger is at the center of a bureaucratic tussle within the White House. → Read More

Explaining Spyware, and How Governments Can Use It for Intimidation

In the hands of law enforcement and intelligence agencies, spyware can track criminals and terrorists. In the hands of repressive governments, it can be a tool of intimidation and retribution against activists, journalists and business executives. A particularly sophisticated version produced by Israeli software maker NSO Group Ltd., which can surreptitiously bug a target phone without any… → Read More

Sinclair Broadcast Hack Linked to Notorious Russian Cybergang

A weekend cyberattack against Sinclair Broadcast Group Inc. was linked to one of the most infamous Russian cybergangs, called Evil Corp., according to two people familiar with the attack. The Sinclair hackers used malware called Macaw, a variant of ransomware known as WastedLocker. Both Macaw and WastedLocker were created by Evil Corp., according to the two people, who requested anonymity to… → Read More

UN Computer Networks Breached by Hackers Earlier This Year

Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization. → Read More

How Pegasus Took Spyware’s Potency to a New Level

Spyware is used by law enforcement and intelligence agencies to track criminals and terrorists. In the hands of repressive governments, it can be a tool used against enemies. → Read More

Biden Elevates Ransomware Threat to National Security Priority

Biden will meet with various agency leaders behind closed doors on Wednesday to discuss ransomware and ways to combat it, the White House said in a statement on Tuesday night that called the risk a “national security and economic security priority for the administration.” → Read More

Russia ‘Cozy Bear’ Hackers Breached GOP as Ransomware Attack Hit

Russian government hackers breached the computer systems of the Republican National Committee last week, around the time a Russia-linked criminal group unleashed a massive ransomware attack, according to two people familiar with the matter. → Read More

Massive Ransomware Attack May Impact Thousands of Victims

Just weeks after President Joe Biden implored Vladimir Putin to curb cyber crime, a notorious, Russia-linked ransomware gang has been accused of pulling off an audacious attack on the global software supply chain. → Read More

Hackers Breached Colonial Pipeline Using Compromised Password

The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast was the result of a single compromised password, according to a cybersecurity consultant who responded to the attack. → Read More

Hacking Outfit Linked to Russia Is Behind JBS Cyberattack

A notorious Russia-linked hacking group is behind the cyberattack against JBS SA, according to four people familiar with the assault who were not authorized to speak publicly on the matter. The cyber gang goes by the name REvil or Sodinokibi. → Read More

Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom

Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack,… → Read More

Colonial Hackers Stole Data Thursday Ahead of Shutdown

The hackers who caused Colonial Pipeline to shut down the biggest U.S. gasoline pipeline on Friday began their blitz against the company a day earlier, stealing a large amount of data before locking computers with ransomware and demanding payment, according to people familiar with the matter. → Read More

A 23-Year-Old Coder Kept QAnon Online When No One Else Would

Nick Lim provides tech support to the U.S. networks of White nationalists and conspiracy theorists banned by the likes of Amazon. → Read More

Mercer-Backed Parler Casts Its Reboot as Fight for Free Speech

Leaked recordings of meetings detail role of Rebekah Mercer at social-media platform → Read More

Microsoft Attack Blamed on China Morphs Into Global Crisis

A sophisticated attack on Microsoft Corp.’s widely used business email software is morphing into a global cybersecurity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.The attack, which Microsoft has said started with a Chinese government-backed hacking group, has so far claimed at least 60,000 known victims globally, according to… → Read More