Andrew Blake | Stories - Washington Times
Skip to content

Andrew Blake

Andrew Blake is a digital writer/cybersecurity reporter for The Washington Times. He is passionate about cybersecurity, technology and the Internet. Andrew graduated from the University at Buffalo with a degree in cultural anthropology. He can be reached at

Articles by Andrew Blake

This combination made from images provided by Apple Inc. shows new emoji, the cute graphics that punctuate online writing and texts, that will be available with the next iOS update. Working with the Unicode Consortium, the nonprofit organization that sets the standards for the pictograms, Apple Inc. is incorporating more diverse emoji into the developer version of the latest update to its mobile operating system. The iPhone and iPad maker has not said when the update will be available for all users. (AP Photo/Apple Inc.)

No laughing matter? Facebook says emojis used more often than LOL

Do animated cat GIFs make you LOL? Or are you more likely to evoke the emoji when entertained on the Web? A new report conducted by researchers with Facebook reveals that the laugh-out-loud acronym might soon go the way of Hamster Dance and Hotmail as Internet users embrace alternative ways of expressing emotions online. Published August 10, 2015

This Tuesday, April 7, 2015, photo shows the instrument panel of a Tesla Model S 70-D electric car during a test drive, in Detroit. Tesla is going after mainstream luxury car buyers by boosting the range, power and price of its low-end Model S. The $75,000 all-wheel-drive 70-D can go a government-certified 240 miles per charge, has 514 horsepower and can go from zero to 60 in 5.2 seconds. (AP Photo/Carlos Osorio)

Hackers detail car, gun exploits at Las Vegas convention

The surge of high-tech smart cars on the roads is a surefire sign the auto industry is embracing the so-called "Internet of things." But at a hacker conference in Las Vegas on Friday, researchers said poor security practices could pose some very serious problems down the road. Published August 7, 2015

(Associated Press/File)

Medical devices too prone to hackers, researchers warn

At a conference in Las Vegas on Thursday, security researchers said that hundreds of common medical devices, ranging from X-ray machines to MRIs, have been vulnerable to attack by hackers. Published August 6, 2015

President Barack Obama speaks at the White House Summit on Cybersecurity and Consumer Protection in Stanford, Calif., Friday, Feb. 13, 2015. (AP Photo/Jeff Chiu)

White House endorses CISA cyber bill amid Senate stalemate

Democrats and Republicans are both applauding the White House for coming out in support of a cybersecurity bill that lawmakers in the Senate are trying to pass before breaking for recess later this week. Published August 5, 2015

In this Feb. 1, 2011, file photo, medical marijuana clone plants are shown at a medical marijuana dispensary in Oakland, Calif. (AP Photo/Jeff Chiu, File)

Cops under fire for pot dispensary raid want surveillance footage tossed

Police officers in California are in hot water for their actions during a recent medical marijuana dispensary raid. An internal affairs probe could become problematic, however, if a lawsuit is successful in keeping surveillance footage from being used against the officers. Published August 5, 2015

In this Tuesday, Sept. 9, 2014, file photo photo, specialists work at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va. (AP Photo/Manuel Balce Ceneta) ** FILE **

CISA showdown: Senate leaders look toward last-minute cybervote

Leadership in the Senate from both sides of the aisle are gunning to get a controversial cybersecurity proposal up for a vote before the start of summer recess, but concerns from lawmakers and tech experts alike may delay attempts to pass the proposal until Congress convenes again in September. Published August 4, 2015

United States Military Academy cadets watch data on computers at the Cyber Research Center at the United States Military Academy in West Point, N.Y., Wednesday, April 9, 2014. The West Point cadets are fending off cyber attacks this week as part of an exercise involving all the service academies. The annual Cyber Defense Exercise requires teams from the five service academies to create computer networks that can withstand attacks from the National Security Agency and the Department of Defense. (AP Photo/Mel Evans)

IT worker gets 10 years for hacking military email

A Florida man contracted to perform IT work for the Pentagon has been sentenced to 10 years in prison after pleading guilty to crimes connected to the hacking of a military email account and theft of sensitive files. Published August 3, 2015 defaced by Jon Stewart-loving hacktivists

New poll numbers continue to show Donald Trump as the favorite among Republican voters ahead of next year's presidential election, but the billionaire business tycoon is attracting attention now not just from conservatives, but computer hackers too. Published August 3, 2015

(Associated Press/File)

Anti-virus maker BitDefender admits hacker stole user data

BitDefender, a Romanian software company that supplies Internet security products to hundreds of millions of clients both in the workplace and at home, admits hackers have made off with the usernames and passwords of an undisclosed number of customers. Published July 31, 2015

President Barack Obama offers a toast to President Xi Jinping of China during a State Banquet at the Great Hall of People in Beijing, China, Nov. 12, 2014. (Official White House Photo by Pete Souza)

China stole data from 600 American cyber targets, says NSA

The Chinese government has successfully stolen data from the computer systems of more than 600 American targets during the course of the Obama administration, including private sector and military entities. Published July 31, 2015

Sen. Ron Johnson, R-Wis., walks on Capitol Hill in Washington, in this Tuesday, April 1, 2014, file photo. (AP Photo/Cliff Owen, File)

Senate panel wants DHS to control .gov domains

A Senate committee is quickly moving forward on a proposal that gives the U.S. Department of Homeland Security more authority in protecting government websites. Published July 30, 2015

In this Thursday, March 12, 2015, photo, a fourth-grader uses Google docs to complete an exercise at Mira Vista School in Richmond, Calif. (AP Photo/Eric Risberg) ** FILE **

Not my type: Browser tool combats monitoring of online behaviors

You can learn a lot about a person by the websites they visit, but what can be inferred by the speed of their keystrokes? Two privacy-minded security experts have released a tool that they say obscures the digital footprints left not by metadata, but behavioral biometrics. Published July 30, 2015

In this Thursday, March 12, 2015, photo, a first-grader learns keyboarding skills at Bayview Elementary School in San Pablo, Calif. (AP Photo/Eric Risberg)

Hacking Team CEO says terrorists and criminals are benefiting from breach

The CEO of a recently hacked spyware vendor says the attack against his company has made it easier for criminals and terrorists to operate, but privacy advocates say the breach has been instrumental in propelling an international discussion on surveillance tech. Published July 29, 2015