Online legal publishers squabble over the right to copyright the law
Do private online publishers own the law, or does it belong to the people?
View ArticleClean File Metadata Exchange Makes it Easy to Separate Malware from Safe Files
There are plenty of great antivirus products out there, but sometimes they miss the mark. Seeing how much malware a security program catches is one way to evaluate it, but so is recording its number of...
View ArticleHackers Trying to Steal Your Tax Refund With Stolen SSNs
Hackers are using stolen Social Security numbers and bots to steal your money from the IRS's E-File system. It's tax season, and hackers are once again trying to cash in. The IRS on Tuesday announced...
View ArticlePwn2Own Hacking Contest Returns as Joint HPE-Trend Micro Effort
Over a half million dollars in prize money is up for grabs as the Zero Day Initiative browser hacking contest continues even as corporate ownership shifts. The annual Pwn2Own browser hacking...
View ArticleDish to disable DVR ad-skip for 7 days after broadcast to resolve Fox suit
No precedent on consumers' right to stream content they already paid for.
View ArticleCongress passes permanent ban on Internet access taxes
New law would force seven states to phase out existing tax schemes by 2020.
View ArticleAll the president’s spies: Which candidates back the NSA
National security, and the role that government surveillance plays in it, has been one of the hot-button issues of this presidential campaign.The USA Freedom Act -- which was passed last June with...
View ArticleWhen it comes to spaffing your login creds, Android biz apps are the business
Business apps for Android are three times more likely to leak login credentials than the average app, according to a new study by security firm NowSecure. An analysis of more than 400,000 apps...
View ArticleIt’s official: Older versions of IE are now at risk
Microsoft this week made good on a 2014 promise and withheld security updates from users of older versions of the company's Internet Explorer (IE) browser.All Windows users still running IE7 or IE8...
View ArticleStudy finds anti-encryption laws won’t work on an international stage
In response to attempts to put restrictions on encryption technology, a new report surveys 546 encryption products in 54 countries outside the United States, out of 865 hardware and software produc...
View ArticleSkype users were targeted by bad-ad pushing Angler crooks
Cybercrooks have been caught running booby-trapped ads on Skype to redirect users towards an Angler exploit kit trap. The tactic, part of a broader malvertising campaign, shows that users can be...
View ArticleJudge: Google dominance didn’t hurt online maps competitor
StreetMap traffic fell after Google began showing map previews in search results.
View ArticleClass-action suit over iPhone-bricking Error 53 filed in California
Error affects iPhone 6 and 6S handsets with replaced or damaged TouchID sensors.
View ArticleSymantec Warns of Malware Posing as Netflix Apps
A bogus Netflix app delivers more than just free movies; it also delivers malware and could steal the credentials of legitimate users too. Netflix has emerged in recent years as one of the most popular...
View ArticleVTech: If We Get Hacked Again, It’s Not Our Fault
VTech's Learning Lodge is back online after an embarrassing hack that exposed the personal information of kids and their parents. But if it happens again? Don't blame VTech. As noted by security...
View ArticleSony attackers thought to be behind multiple large attacks
Regardless of whether you think the attack against Sony in late 2014 was committed by North Koreans in order to stop a movie, there is new evidence that links the perpetrators to several other large...
View ArticleWarning: Bug in Adobe Creative Cloud deletes Mac user data without warning
Adobe has stopped distribution of an update believed to be triggering the deletions.
View ArticleCarbonite
Carbonite is one of the most recognizable names in online backup. It's also one of the easiest-to-use online backup services around, its mobile apps are well done, and it presents a good value for your...
View ArticleFour men—including a pair of pastors—sue Tacoma police over stingray documents
ACLU: "The Constitution protects Americans against searches without suspicion."
View ArticleIoT Could Be Used by Spies, U.S. Intelligence Chief Says
James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries. As the Internet of things has grown, so has the debate...
View Article