Search
  • Videos
  • Enterprise Software
  • Windows 10
  • Cloud
  • AI
  • Security
  • TR Premium
  • more
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Enterprise Software
    • Windows 10
    • Cloud
    • AI
    • Security
    • TR Premium
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Top tech blunders, catastrophes and epic fails of 2013

17 of 20 NEXT PREV
  • U.S. can't handle its scandal: 2013 mass surveillance leaks

    U.S. can't handle its scandal: 2013 mass surveillance leaks

    In June, U.S. former government contractor Edward Snowden blew the lid on one of the world's biggest secrets in living history: the U.S. government was engaged in a massive global dragnet surveillance operation.

    Featured

    • 25 wacky and wonderful tech stocking stuffers under $25
    • Must-have tech gadgets to start 2020
    • 12 gifts for the holidays: Between Apple, Google, DJI, and Amazon there’s something for everyone
    • Top gadgets for the security and privacy conscious (or the super paranoid!)

    The leaks sparked mass debate around the world between national security priorities and citizen civil liberties. It was a massive punch in the face for the White House, which had spent decades keeping the spying programs under wraps. 

    Snowden was charged with espionage , but ultimately fled to Russia under the former-Communist country's protection, and out of the U.S.' reach. But additional leaks implicated other nations, including those of the "Five Eyes" — the U.K., Australia, Canada, and New Zealand. It was a government stuff-up on epic proportions.

    It was without doubt the epic fail of the year — allowing Snowden to walk away with tens of thousands of documents that detail in near-exact detail how the U.S. and other countries spy on each other (and themselves).

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: Seth Rosenblatt/CNET

    Caption by: Zack Whittaker

  • Amid NSA scandal, the collapse of journalism

    Amid NSA scandal, the collapse of journalism

    The U.S. government leaks were bad enough, but the early reporting on the emerging NSA scandal was just as dire. 

    Read this

    NSA mass surveillance leaks: Timeline of events to date

    NSA mass surveillance leaks: Timeline of events to date

    The U.S. government mass surveillance scandal may be the biggest ongoing story of the year. In this updating timeline, you can explore the full scope of the Edward Snowden leaks, which have implicated the world's most powerful nations in the worldwide spying operation.

    Read More

    With the release of the first slides on PRISM, the two newspaper giants The Guardian and The Washington Post were behind the breaking stories. But The Post, which was playing catch-up with its British journalistic counterparts, reported something that was not strictly true — even if it's what the leaked documents said or even alluded to.

    Despite being the one and only source on the matter, the newspapers failed to "vet" him properly. 

    Claiming that the NSA had "direct access" to servers of Silicon Valley giants led The Post to eventually withdraw the vast majority of its story without explaining exactly what or why . It was a mess that led to harsh critique of the publication.

    The Post went on to accurately report further leaks supplied by the former U.S. government contractor.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: Ed Bott/ZDNet

    Caption by: Zack Whittaker

  • Java zero-day exploit led to spate of Silicon Valley hacking

    Java zero-day exploit led to spate of Silicon Valley hacking

    While the NSA was not able (that we know of... yet) to gain "direct access" to Silicon Valley servers — with the exception of Google and Yahoo , hackers successfully infiltrated the internal networks of Apple, Facebook, Microsoft, and Twitter.

    Read this

    Facebook, Apple hacks could affect anyone: Here's what you can do

    Facebook, Apple hacks could affect anyone: Here's what you can do

    Reports suggest that both Facebook and Apple employees — and likely others, including Twitter — visited an infected website laden with malware, which exploited a vulnerability in Java. Now that the cause has been identified, here's what you can do.

    Read More

    The story broke at the start of the year in a tale of two parts. Hackers had rigged a popular iPhone development site with malware. When developers at the named companies accessed the site from a work machine, an unpatched Java zero-day exploit allowed attackers into their internal networks.

    While no company data was taken, with Microsoft et al admitting that only a few machines were affected, it came at a time where many companies were on their guard from a recent spate of China and Syria-based hackers.

    Even the U.S. Dept. of Homeland Security warned users to disable or uninstall Java as a result of the flaw, which ultimately went on to affect hundreds of millions of Windows, Mac, and Linux machines — including mobile devices, embedded systems, Web applications, and servers.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: ZDNet/Internet Archive

    Caption by: Zack Whittaker

  • Controversial cyber-security data sharing law passes the U.S. House

    Controversial cyber-security data sharing law passes the U.S. House

    The Cyber Intelligence Sharing and Protection Act, commonly referred to as CISPA, was a controversial security bill that eventually passed the U.S. Senate, despite being scrapped more than a year earlier.

    Read this

    White House threatens to veto new CISPA Bill ahead of vote

    White House threatens to veto new CISPA Bill ahead of vote

    The Obama administration has issued another stark warning to the US House currently preparing to vote on a regurgitated cybersecurity Bill. If it passes the president's desk, he's not going to sign it.

    Read More

    Many considered the bill to be a major threat to Fourth Amendment rights , which protect against unreasonable searches and seizures. It would have allowed private sector firms to search personal and sensitive user data of ordinary U.S. residents to identify "threat information," which can then be shared with other opt-in firms and the U.S. government without the need for a court-ordered warrant. 

    It was hoped that the data could be used in real time to stop cyberattacks in their tracks , or even trace back to the source of the attack. 

    Despite the uproar and the concern by many, the fact that senators still passed the bill — even if it failed in the House — represented a disaster for citizen representation, as hundreds of thousands protested the bill.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Anonymous rages on: Hacks prevail, leaks continue

    Anonymous rages on: Hacks prevail, leaks continue

    If you thought hacktivist group Anonymous had been relatively quiet this year, think again.

    Read this

    Anonymous website disappears with $100M in Bitcoin

    Anonymous website disappears with $100M in Bitcoin

    Illegal goods trading platform, Sheep Marketplace, shuts down with a Bitcoin haul estimated to be as large as US$100 million. It is unclear if hackers or the site owner absconded with the money, but signs point to a scam.

    Read More

    In January, the hacking group  attacked the U.S. Sentencing Commission  in an operation dubbed "Operation Last Resort." This led to the distribution of government files in apparent retaliation of hacktivist Aaron Swartz, who committed suicide after facing a lengthy jail sentence many considered disproportionally large.

    The federal authorities were left "stumbling" after the attack , which resulted in a number of government websites being down for days. 

    Later in the year, the loose-knit collective went on to attack networks that led to the publication of more than 4,000 separate bits of login information, credentials, IP addresses, and contact information of American bank executives. 

    It was a public relations nightmare for the U.S. government, which had already faced heavy criticism for its handling of the Swartz case. It was a show of force that led the government and others to realize the hacking collective may have been quiet during the year, but they haven't gone away — while at the same time pushing for changes to the law that would ultimately legally avenge the death of Swartz in a namesake law.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: Guardian/Twitter

    Caption by: Zack Whittaker

  • iOS 7 design change freaked out some people; suffers with bugs, security lapses

    iOS 7 design change freaked out some people; suffers with bugs, security lapses

    By now, the end of the year, many have overcome the "shock" of the new user interface to Apple's latest mobile platform, iOS 7. 

    Read this

    Apple's iOS 7 hands-on, in pictures (gallery)

    Apple's iOS 7 hands-on, in pictures (gallery)

    The iPhone and iPad maker on Monday announced iOS 7, its latest mobile operating system. ZDNet takes it for a test drive and shows you the new user interface and some of the new features.

    Read More

    But it caused  enough of a stir  at first to deter millions from upgrading immediately.

    Many didn't upgrade immediately because it broke existing enterprise services . Some were warned off because the upgrade would cause device slow-downs. And, other bugs made the software near impossible to use for some. There were dozens of new features added in the update that saw a high level of uptake, but hardly rocket to the extent Apple wanted.

    Now more than three months later, three-quarters of all devices are running iOS 7, a slower pace than earlier releases.

    Some of the major issues boiled down to security. There was a bug seemingly every minute, and a security flaw with almost every minor update.

    In one case, it was possible to bypass the lock screen and forward personal photos and contacts to other people.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Facebook hit with privacy, "shadow profile" controversies

    Facebook hit with privacy, "shadow profile" controversies

    Facebook stirred more controversy this year as it attempted to balance privacy and free speech, but couldn't manage to do either.

    Read this

    • Anger mounts after Facebook's 'shadow profiles' leak in bug
    • Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone

    The world's largest social network, with more than one billion users worldwide, collected information on people who weren't even signed up to the social network. This "bug" spanned a year beginning in 2012 and affected more than six million users . The data related to people who had expressly not given their permission for Facebook to collect their data, including email addresses and phone numbers. For those who protect their data, it was a privacy flop of epic proportions.

    Also, the company found itself in hot water after it decided to first ban and then permit videos of people being decapitated. Either way, Facebook couldn't escape controversy. In any case, Facebook's decision was going to royally screw up at least someone's day.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: James Martin/CNET

    Caption by: Zack Whittaker

  • FBI inadvertently brings file-sharing battle to worldwide attention

    FBI inadvertently brings file-sharing battle to worldwide attention

    If you're going to bring someone down, try to do it quietly. In the FBI's case, the federal agency failed miserably when it tried to extradite alleged pirate king Kim Dotcom to the U.S.

    Read this

    • Well done, FBI, for helping Kim Dotcom achieve global fame

    The trouble is the FBI picked the wrong guy to start a war with . Despite throwing the full weight of the New Zealand police to launch a look-a-like anti-terrorist operation against for charges of "racketeering, money laundering, and copyright theft," he ultimately evaded U.S. authorities.

    Dotcom dusted himself off and relaunched his newly branded file service startup. As for the New Zealand authorities, they were slapped for "illegal spying" which forced the country's prime minister to publicly apologize.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: Kim Dotcom/Twitter

    Caption by: Zack Whittaker

  • Windows 8 struggles to grasp usage share; updates aim to redirect course

    Windows 8 struggles to grasp usage share; updates aim to redirect course

    Months after Windows 8 launched, the operating system barely grasped single-digit market share . Many considered it a flop, but to others it was a starting ground for better things to come.  

    Read this

    Microsoft no longer the Windows company. Does Wall Street agree?

    Microsoft no longer the Windows company. Does Wall Street agree?

    Microsoft's share price has reached record highs in spite of criticism over Windows 8. Does Wall Street finally believe the Microsoft message that it’s no longer dependent on Windows?

    Read More

    It was criticized for its game-changing user interface. It was difficult to use for some who had been used to the typical 'Windows' experience for many years prior.

    And for those using desktops and notebooks without touch screens — a large majority of the overall user base — it was just too much for some to relearn. The fact that Microsoft killed the Start menu also killed the company's hope of millions of people upgrading.

    Ultimately it led the software giant down a course of eating humble pie , resulting in Windows 8.1, a software update that attempted to appease (and entice) customers who were thrown off by the first round of changes. The Start menu was brought back — in a sense — and booting directly to desktop may have had some positive impact on less-than-pleased customers.

    Many forgot that Microsoft isn't just a "Windows" company anymore. 

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • iPhones, iPads banned from business networks thanks to Exchange conflict

    iPhones, iPads banned from business networks thanks to Exchange conflict

    Before iOS 7 was even announced, iOS 6.1 was causing serious headaches in the enterprise IT department.

    Read this

    • iOS 6.1 banned from corporate servers due to Exchange snafu
    • Apple, Microsoft investigating iOS 6.1 overloading Exchange Servers; posts workaround

    Corporate network staff warned iPhone and iPad users to avoid upgrading to the latest Apple mobile update because of a server conflict bug that would overload over Microsoft Exchange servers.

    Both companies scrambled to determine what was the cause of the "excessive logging" on email servers. While Apple was left scratching its head, Microsoft came to the rescue.

    The one bright side was the cooperation between the two technology giants , who not long before were at war with one another.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Samsung's breakthrough smart watch was scolded by critics

    Samsung's breakthrough smart watch was scolded by critics

    Desperate to get ahead of rumors that its archrival Apple was developing a smart watch, Samsung threw its weight behind its own Galaxy Gear.

    Read this

    • Samsung finally unpacks Galaxy Gear smartwatch: By the numbers
    • Samsung unpacks new smartwatch, smartphone, tablet (photos)
    • If this is Samsung's smart watch, it's already a failure

    The trouble was, it wasn't finished , and looked more akin to a slightly polished namesake device from the late 1990s.

    Many dubbed it a "failure" off the mark , and still cost watch wearers $299 for the privilege of having something that wasn't complete.

    That said, close to one million people still bought the device, but the device suffered "death by review." The tech media crushed the device in their write-ups.

    Meanwhile, a number of other wearable devices hit the market later on after further development in efforts to learn from Samsung's mistakes.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Yahoo's string of fluff-ups month-on-month

    Yahoo's string of fluff-ups month-on-month

    Yahoo had a tough year. It spent most of its time cleaning up the horrendous mess it created by changing something, redesigning something, or upgrading a product. It left end users angry, and even its own staff stressed out.

    Read this

    How Microsoft dodged the Yahoo bullet

    How Microsoft dodged the Yahoo bullet

    It was five years ago this month that Microsoft officially dropped its plan to acquire Yahoo for $47.5 billion. In hindsight, losing that battle was the best thing that could have happened to Microsoft.

    Read More

    Just months after starting at the company, Yahoo chief executive Marissa Mayer repealed the company's telecommuting policy , forcing all employees to muck-in at their respective local offices. The decision alone was controversial, but it was only compounded by a lack of explanation behind the move.

    The company then gave itself a makeover with a new redesigned logo. Not one, but 30 over the course of as many days. Eventually it settled on just one , spreading the news out for longer than it should've done in efforts to milk the media's attention. 

    But what really angered a lot of people, including Yahoo staff who reportedly don't even eat their own "dogfood," was the redesigned Yahoo Mail, which crumbled after it first relaunched.

    Thousands of users complained about the new product as a result of the bevy of technical failures and glitches.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: Yuko Honda via CNET

    Caption by: Zack Whittaker

  • BlackBerry unravels, chief executive 'resigns'

    BlackBerry unravels, chief executive 'resigns'

    BlackBerry was already on a downward spiral, but really began to crumble when it reported a near-$1 billion loss as a result of going all-in on its next-generation smartphone, the BlackBerry Z10. 

    Read this

    • BlackBerry's latest revamp: New CEO Chen a big plus, but...
    • BlackBerry's bid to find buyer fails; chief executive Heins out
    • BlackBerry to customers, partners: Don't freak out (or bail on us) yet

    The company cut 4,500 staff amid serious concerns about the company's balance sheet. BlackBerry was already by this point looking for a bank or investment firm to bail out the company, which ultimately failed.

    BlackBerry subsequently waved goodbye to its chief executive Thorsten Heins, who failed to turn the company around following the rise of competing smartphones.

    Former Sybase boss John Chen took the lead and promised to turn the company around. But the proof will be in the pudding. Chen said he will "rebuild" the company and keep the smartphone-making unit, but many enterprise customers are looking 

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: BlackBerry

    Caption by: Zack Whittaker

  • Obamacare passes, but Healthcare.gov falls flat on its face

    Obamacare passes, but Healthcare.gov falls flat on its face

    Yes, this may be buried way down the list but it was arguably the biggest public-raging stuff-up of the year. It even had the President knocking it from above.

    Read this

    • Obama dubs Healthcare.gov glitches 'unacceptable'; calls in tech support
    • Government admits to design flaws in healthcare.gov
    • Report: Google, Oracle, and Red Hat tapped to fix Healthcare.gov
    • Healthcare.gov hosting service Verizon to be replaced by HP

    The Affordable Care Act, or "Obamacare," was just one part of the plan to overhaul the U.S. healthcare system. The problems landed with the website, which on launch day failed to work.

    It was an absolute mess: data wasn't going to the right places, users couldn't sign up for anything, and the website would crash every few seconds making it impossible to do anything. 

    The White House brought in the big guns in form of Silicon Valley to help fix the failed website . Eventually the hosting was scrapped and replaced by HP , which actually knows what it's doing when it comes to these things.

    It took two whole months to realize the scope of the issues, and extended the deadline for sign-ups into 2014 to appease disgruntled Americans. 

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CBS/ZDNet

    Caption by: Zack Whittaker

  • Google squares up with Europe over antitrust charges

    Google squares up with Europe over antitrust charges

    Google dropped the ball this year when it was forced to renegotiate (at least on two occasions) its antitrust settlement with the European Union, after the executive body  threw allegations of anticompetitive behavior  at the search giant.

    Read this

    • Here's what Google will look like in a post-antitrust Europe
    • Google faces partial ban in Europe if antitrust talks crash

    The company said  it "did a pretty good job"  on offering concessions to the 28 member state bloc, which was quickly  thrown back by Europe's antitrust chief  who remained less than pleased with the offering. It was a particularly embarrassing public relations stunt for Google. And the case is far from over yet.

    In efforts to avoid being forced to change its business practices, the world's most used search engine may end up having to  offer links to competing services  to its own products.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: ZDNet

    Caption by: Zack Whittaker

  • HTC may be "quietly brilliant," but also "loudly sinking"

    HTC may be "quietly brilliant," but also "loudly sinking"

    Despite its good quality and high-end Android phones, Taiwanese phone giant HTC began to sink rapidly over the course of the year.

    Read this

    • HTC Q3 loss worse than expected, could go more Windows
    • Amazon planning smartphone debut with HTC: report

    After having a fairytale 2010, two years later the company's finances began to unravel. Eventually the company was forced to look inwards and work out what was causing the issues.

    It turns out it was the chief executive, Peter Chou, who after a series of mistakes and ill-thought out plans led the company down a path of likely no return. 

    Chou eventually was all-but-forced to hand over some of his responsibilities to the company's founder and chairwoman following a number of high-level executives dashed for the door . Further cutbacks also saw a number of U.S. staff lose their jobs . And even with a reported Amazon smartphone deal , there's no certainty if the company can keep its head above the water.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Apple's iPhone 5s' fingerprint sensor bypassed in days after launch

    Apple's iPhone 5s' fingerprint sensor bypassed in days after launch

    The flagship feature to Apple's premium model iPhone 5s, announced in September, was a fingerprint sensor dubbed Touch ID .

    Read this

    • Apple's advanced fingerprint technology is hacked; should you worry?
    • Hackers claim first iPhone 5s fingerprint reader bypass; bounty founder awaiting verification

    It was described as one of the most advanced biometric scanners developed by a company to date. It didn't last long though.

    Within just a few days, a bounty was put on the technology's head to see if hackers could bypass the device's security. Lo and behold, the Cupertino, Calif.-based technology giant ended up with egg on its face after it was bypassed with a fake finger .

    Apple stayed mum on the matter and didn't acknowledge the hack. It was nice while it lasted — all of about a week.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Tesla rips New York Times over dubious review

    Tesla rips New York Times over dubious review

    Up and coming technology star Tesla suffered serious burns from a journalism fire set by The New York Times, which claimed in a review of its Tesla Model S that the electric car couldn't keep a charge and ran out of juice long before the reviewer reached their intended destination. 

    Read this

    • Google, Tesla back big electric vehicle charging rollout
    • Tesla plans San Jose manufacturing site for electric car

    Tesla founder and all-round genius Elon Musk lambasted the article, which he claimed cost the company about $100 million as a result.

    Musk accused the reviewer of failing to charge the car fully before his intended roadtrip — all revealed by the car's logs, which Musk later published — leading to claims of bias and suggestions that the reviewer "faked" the test.

    In the end, though Tesla suffered a hit at first, it was the New York-based newspaper that came away far more bruised.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Adobe security breach affects tens of millions, fallout extensive

    Adobe security breach affects tens of millions, fallout extensive

    In what was probably the worst hack of the year (perhaps the decade, shy of Sony PlayStation's Network hacking catastrophe).

    Read this

    • Just how bad are the top 100 passwords from the Adobe hack? (Hint: think really, really bad)
    • Facebook mines Adobe breach data for reused passwords, warns users to change them or disappear

    Adobe suffered a massive data breach in October that resulted in the theft of up to 38 million users . 

    Many were more angered by the fact Adobe didn't start emailing people affected by the hack until close to a month after the news first came to light.

    Some of the passwords were simply and easy to crack , in spite of Adobe's encryption methods.

    As a result, other companies — like Facebook and Amazon — took charge of its own user base and warned those who might have used the same Adobe password on the social network to change their passwords too .

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: ZDNet

    Caption by: Zack Whittaker

  • Google Reader shuts down; users go nuts

    Google Reader shuts down; users go nuts

    Life is full of those hacks that make the day-to-day just that much easier. The online world isn't so different.

    Read this

    • Goodbye Google Reader: Here are five RSS alternatives
    • Who will pick up RSS now that Google Reader is going bye-bye?

    So when Google decided to close down its Web-based RSS reader , the internet jumped off the deep end. 

    Because so many applications and services rely on Google Reader, it led to many popular services shutting down, but also many springing up to replace the news aggregator. Google said it was closing the service in order to put energy "into fewer projects," but many loyal users weren't happy — in total, millions of them.

    The bright side is that it gave other companies a way to fill the void. Feedly, a replacement Google Reader service, drummed up half-a-million new users in just two days, and three million in the following two weeks.

    Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

    Photo by: Google/CNET

    Caption by: Zack Whittaker

17 of 20 NEXT PREV
Zack Whittaker

By Zack Whittaker for Between the Lines | December 7, 2013 -- 05:00 GMT (21:00 PST) | Topic: Security

  • U.S. can't handle its scandal: 2013 mass surveillance leaks
  • Amid NSA scandal, the collapse of journalism
  • Java zero-day exploit led to spate of Silicon Valley hacking
  • Controversial cyber-security data sharing law passes the U.S. House
  • Anonymous rages on: Hacks prevail, leaks continue
  • iOS 7 design change freaked out some people; suffers with bugs, security lapses
  • Facebook hit with privacy, "shadow profile" controversies
  • FBI inadvertently brings file-sharing battle to worldwide attention
  • Windows 8 struggles to grasp usage share; updates aim to redirect course
  • iPhones, iPads banned from business networks thanks to Exchange conflict
  • Samsung's breakthrough smart watch was scolded by critics
  • Yahoo's string of fluff-ups month-on-month
  • BlackBerry unravels, chief executive 'resigns'
  • Obamacare passes, but Healthcare.gov falls flat on its face
  • Google squares up with Europe over antitrust charges
  • HTC may be "quietly brilliant," but also "loudly sinking"
  • Apple's iPhone 5s' fingerprint sensor bypassed in days after launch
  • Tesla rips New York Times over dubious review
  • Adobe security breach affects tens of millions, fallout extensive
  • Google Reader shuts down; users go nuts

Thanksgiving is over, and we're already deep into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2013.

Read More Read Less

Apple's iPhone 5s' fingerprint sensor bypassed in days after launch

The flagship feature to Apple's premium model iPhone 5s, announced in September, was a fingerprint sensor dubbed Touch ID .

Read this

  • Apple's advanced fingerprint technology is hacked; should you worry?
  • Hackers claim first iPhone 5s fingerprint reader bypass; bounty founder awaiting verification

It was described as one of the most advanced biometric scanners developed by a company to date. It didn't last long though.

Within just a few days, a bounty was put on the technology's head to see if hackers could bypass the device's security. Lo and behold, the Cupertino, Calif.-based technology giant ended up with egg on its face after it was bypassed with a fake finger .

Apple stayed mum on the matter and didn't acknowledge the hack. It was nice while it lasted — all of about a week.

Published: December 7, 2013 -- 05:00 GMT (21:00 PST)

Caption by: Zack Whittaker

17 of 20 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Zack Whittaker

By Zack Whittaker for Between the Lines | December 7, 2013 -- 05:00 GMT (21:00 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

  • The world's most famous and dangerous APT (state-developed) malware

    A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military ...

  • Best-paid tech jobs, malware warnings and shadow IT: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums