As we saw most recently with SoftBank’s acquisition of Sprint, foreign companies looking to get into the US telecoms business need to sign away some important decision-making power. The Wall Street Journal
The extended online outage of the New York Times highlghts a profound, long-standing security weakness in digital commerce: the pervasive use of a simple user name and passwords to access online accounts.
An update to a free online password-cracking program just made it easier for hackers to get their hands on more complex passwords. When you sign up for an account on a website and create a password, that
Facebook has just announced the latest round of proposed changes to its data use policy and statement of rights and responsibilities — two legal documents that explain how the company can use the data
By Andrea Peterson Andrea Peterson Reporter who covered technology policy Bio Follow Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from
Director of National Intelligence James Clapper has announced that the US intelligence community will start revealing how many people are targeted each year by surveillance, a long-sought victory for advocates.
When FORBES last spoke to AnchorFree in August 2012, CEO David Gorodyansky put forth a modest goal for his 7 year-old company: “We want to be the way the whole world browses the Web,” he boasted. In the
From strict privacy policies to its origins in Israel, there are a few things that distinguish Viber, the upstart free calls and messaging application, from its more established rival Skype. But the feature
(Shutterstock) Vast network of metadata on 4 billion calls each day stored by the phone company can be sifted by the drug agency September 3, 2013 1:56pm (UTC) The New York Times revealed Monday that Drug
Fingerprint readers. Face Unlock. Retinal scanners. They're all no better than your average password, at least the way Dr. Karl Martin sees it. "Your face, your iris — they're all physical features that
(Maksym Dykha/Shutterstock) The country’s infamous Decree 72, criminalizing a wide, vague set of activities on the Web, went into effect Sunday September 4, 2013 12:30pm (UTC) This article originally on
Camera Company That Let Hackers Spy On Naked Customers Ordered By FTC To Get Its Security Act Together
Let’s say you bought an Internet-connected camera for your home so you could keep an eye on your baby, or watch your dog while you were at work, or to make sure your home was secure while vacationing.
Toshiba If you’ve got communications that absolutely cannot be intercepted—whether you’re a NSA whistleblower, the president of Mexico, or Coca-Cola—quantum cryptography is the way to go. It harnesses
Late last month, Google made sweeping changes to its policies for developers on Play, the official store for apps that run on Android, Google’s smartphone operating system. The changes, which among other
According to a Pew study released today, 86% of Internet users have taken actions to avoid being tracked online. The majority of Internet users don’t feel laws adequately protect their privacy online have
SAN FRANCISCO — Talking about his social network’s early days, Facebook CEO Mark Zuckerberg said he started out with an $8,000 budget and all the responsibility of building his own backend. “In retrospect,
The NSA files,NSA,GCHQ,Surveillance,US news,World news,US national security,Privacy,Technology,Internet,Data protection,Data and computer security,UK news • NSA and GCHQ unlock encryption used to protect
A new leak appearing in The Guardian and The New York Times today details the NSA and GHCQ efforts to circumvent, undermine, and crack various forms of web encryption, based on documents leaked by Edward