Andrew Blake | Stories - Washington Times
Skip to content

Andrew Blake

Andrew Blake is a digital writer/cybersecurity reporter for The Washington Times. He is passionate about cybersecurity, technology and the Internet. Andrew graduated from the University at Buffalo with a degree in cultural anthropology. He can be reached at

Articles by Andrew Blake

United States Military Academy cadets watch data on computers at the Cyber Research Center at the United States Military Academy in West Point, N.Y., Wednesday, April 9, 2014. The West Point cadets are fending off cyber attacks this week as part of an exercise involving all the service academies. The annual Cyber Defense Exercise requires teams from the five service academies to create computer networks that can withstand attacks from the National Security Agency and the Department of Defense. (AP Photo/Mel Evans)

IT worker gets 10 years for hacking military email

A Florida man contracted to perform IT work for the Pentagon has been sentenced to 10 years in prison after pleading guilty to crimes connected to the hacking of a military email account and theft of sensitive files. Published August 3, 2015 defaced by Jon Stewart-loving hacktivists

New poll numbers continue to show Donald Trump as the favorite among Republican voters ahead of next year's presidential election, but the billionaire business tycoon is attracting attention now not just from conservatives, but computer hackers too. Published August 3, 2015

(Associated Press/File)

Anti-virus maker BitDefender admits hacker stole user data

BitDefender, a Romanian software company that supplies Internet security products to hundreds of millions of clients both in the workplace and at home, admits hackers have made off with the usernames and passwords of an undisclosed number of customers. Published July 31, 2015

President Barack Obama offers a toast to President Xi Jinping of China during a State Banquet at the Great Hall of People in Beijing, China, Nov. 12, 2014. (Official White House Photo by Pete Souza)

China stole data from 600 American cyber targets, says NSA

The Chinese government has successfully stolen data from the computer systems of more than 600 American targets during the course of the Obama administration, including private sector and military entities. Published July 31, 2015

Sen. Ron Johnson, R-Wis., walks on Capitol Hill in Washington, in this Tuesday, April 1, 2014, file photo. (AP Photo/Cliff Owen, File)

Senate panel wants DHS to control .gov domains

A Senate committee is quickly moving forward on a proposal that gives the U.S. Department of Homeland Security more authority in protecting government websites. Published July 30, 2015

In this Thursday, March 12, 2015, photo, a fourth-grader uses Google docs to complete an exercise at Mira Vista School in Richmond, Calif. (AP Photo/Eric Risberg) ** FILE **

Not my type: Browser tool combats monitoring of online behaviors

You can learn a lot about a person by the websites they visit, but what can be inferred by the speed of their keystrokes? Two privacy-minded security experts have released a tool that they say obscures the digital footprints left not by metadata, but behavioral biometrics. Published July 30, 2015

In this Thursday, March 12, 2015, photo, a first-grader learns keyboarding skills at Bayview Elementary School in San Pablo, Calif. (AP Photo/Eric Risberg)

Hacking Team CEO says terrorists and criminals are benefiting from breach

The CEO of a recently hacked spyware vendor says the attack against his company has made it easier for criminals and terrorists to operate, but privacy advocates say the breach has been instrumental in propelling an international discussion on surveillance tech. Published July 29, 2015

Texas Republican Sen. John Cornyn (Associated Press) **FILE**

Controversial cybersecurity bill called CISA likely delayed until fall

Consideration of a controversial cybersecurity bill that encourages private companies to share data with the federal government is now expected to be delayed until the fall, with opponents attributing the holdup to their grassroots efforts aimed at derailing the act. Published July 29, 2015

In this June 6, 2013, file photo, a sign stands outside the National Security Administration (NSA) campus on in Fort Meade, Md. The Obama administration has decided that the National Security Agency will soon stop using millions of American calling records it collected under a controversial program leaked by former agency contractor Edward Snowden. (AP Photo/Patrick Semansky, File)

NSA bulk-collected phone records to be purged in November

Historic phone records collected in bulk by the National Security Agency are poised to be purged from the NSA's database later this year, the Office of the Director of National Intelligence said this week. Published July 28, 2015

FILE  - In this Sept. 26, 2014 file photo, smaller-dose pot-infused brownies are divided and packaged at The Growing Kitchen, in Boulder, Colo. A bill up for its first vote in the state legislature on Wednesday., March 25, 2015 would repeal a 2014 Colorado law requiring pot foods to have a distinct look when out of its packaging. (AP Photo/Brennan Linsley, File)

CDC warns of dangers of marijuana edibles

Government health experts warn in a new report that the risks of consuming marijuana-infused edibles like weed brownies and other snacks mustn't be understated following the suicide last year of a man whose death has been blamed on pot. Published July 26, 2015