GeekWire
Menu
  • Home
  • News
    • Amazon
    • Civic presented by Microsoft
    • Geek Life presented by Network of Giving
    • Health/Life Sciences
    • Microsoft
    • Podcasts
    • Space
    • Startups
    • Sustainability
    • Tech Moves
    • Bot or Not
    • GeekWire on the Road: Spokane
    • Microsoft at 50 presented by Accenture
    • Tech Vets presented by Northern Trust
  • GeekWork
    • GeekWork Recruiting
    • Job Board
  • Events
    • Community Calendar
    • GeekWire Events
  • Lists
    • Amazon Office Buildings
    • GeekWire 200 presented by JPMorganChase
    • GeekWire Startup List
    • GeekWire Startup Resources
    • GeekWire Startup Spaces
    • Layoff Tracker
    • M&As and IPOs
    • Northwest Women VC & Angel Investor List
    • Recent Fundings
    • Seattle Engineering Outposts
    • Venture Capital Directory
  • Members
    • Health Benefits
    • Memberships
  • Studios
    • GeekWire Studios: Let Us Tell Your Story
    • Nebius at NVIDIA GTC 2025 sponsored by Nebius
    • AWS Marketplace Seller Conference 2024 sponsored by AWS
    • AWS Summit: New York Partner Spotlights sponsored by AWS
    • Does Compute presented by Carnegie Mellon University
    • Guide to re:Invent sponsored by AWS
    • Money Hacks presented by BECU
    • Tech Connect at Dreamforce 2024 sponsored by RSM US LLP
    • Uncommon Thinkers Welcome sponsored by Greater Seattle Partners
    • Zuper at Inbound sponsored by Zuper
  • About
    • About GeekWire
    • Advertise
    • Contact Us
    • Email Newsletters
    • Reprints & Permissions
    • Sponsors
  • Podcast
  • LinkedIn
  • Newsletter
  • News Tips

What happens here matters everywhere.

  • Podcast
  • LinkedIn
  • Newsletter
  • News Tips
  • Amazon
  • Microsoft
  • Startups
  • AI
  • Science
  • Tech Moves
  • Sustainability
  • Civic
  • Geek Life

Wikileaks

Assange: WikiLeaks to give tech companies details about CIA hacking practices

Days after it leaked hundreds of files documenting CIA hacking practices, WikiLeaks said it will work with tech companies to… Read More

Here’s how the CIA is hacking smartphones and TVs, according to WikiLeaks

WikiLeaks has begun publishing thousands of documents it claims to have taken from the CIA’s Center for Cyber Intelligence. In… Read More

How to avoid falling for the trivial trick used to hack John Podesta’s Clinton campaign emails

A simple, decade-old hacker trick likely led to the hacking of critical Hillary Clinton staff members. If John Podesta can fall for… Read More

Bill and Melinda Gates

Vice President Gates? WikiLeaks emails reveal Bill and Melinda were on Hillary Clinton’s short list

Bill and Melinda Gates were apparently under consideration for Hillary Clinton’s vice presidential nominee, according to an email from campaign… Read More

Edgar Mitchell and Alan Shepard

How aliens and Apollo astronaut Edgar Mitchell got tangled up in WikiLeaks emails

WikiLeaks’ purloined emails cover a wide range of issues that were handled by Hillary Clinton’s campaign chairman, John Podesta, but… Read More

James Bond too sexy for Sony smartphone

This Sony leak seems to be the gossipy gift that keeps on giving. In a snub that only says, “I’m… Read More

Latest Stories

    Read All Stories

    GeekWire Newsletters

    Subscribe to GeekWire's free newsletters to catch every headline

    Send Us a Tip

    Have a scoop that you'd like GeekWire to cover? Let us know.

    Send Us a Tip

    A Word From Our Sponsors

    About

    • About GeekWire
    • Contact Us
    • Partner With Us
    • Become a GeekWire Member
    • Send Us a Tip
    • Join Our Startup List
    • Reprints and Permissions

    Follow

    • Facebook
    • X
    • LinkedIn
    • Instagram
    • RSS Feed
    • Podcast
    • YouTube
    • Bluesky

    GeekWire Newsletters

    Catch every headline in your inbox

    Read GeekWire

    • Apple News
    • Google News

    Legal

    • Privacy Policy
    • Terms of Use
    • Sponsored Content Policy
    Return to Top of Page
    © 2011-2025 GeekWire, LLC
    Do Not Sell or Share My Personal information
    Limit the Use Of My Sensitive Personal Information
    Consent Preferences