- DARPA makes finding software vulnerabilities fun
- Flashlight app vendor settles with FTC over privacy violations
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- NSA cites Reagan-era executive order to justify collection of cellphone location data
- NSA spies on Italians from roof of US Embassy in Rome, magazine reports
The U.S. Federal Communications Commission will aim to conduct auctions to sell spectrum now held by television stations to mobile broadband providers in mid-2015, the chairman of the agency said Friday.
An estimated one in four user applications sent from the U.S. Department of Health and Human Services' HealthCare.gov to insurance providers have errors introduced by the website, including missing applications, an official with the agency said Friday.
The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country's consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L'Espresso claimed Friday.
The U.S. Supreme Court has agreed to hear a controversial software patent case after a federal appeals court ruled that an abstract idea is not patentable simply because it is tied to a computer system.
U.S. securities regulators questioned an early version of Twitter's initial public offering prospectus that claimed the social media company was becoming more profitable when it was actually losing increasing amounts of money.
An IT specialist working for the U.S. National Science Foundation has pleaded guilty to theft of government property for redirecting more than US$94,000 in government funds for his personal use, the U.S. Department of Justice said.
Teams of researchers are hoping to give life to a six-foot, 330-pound humanoid robot at the the Robotics Challenge in Homestead, Fla. on Dec. 20 and 21.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
The head of China's top Bitcoin exchange didn't expect the Chinese government would act so soon in taking its first step to regulating the digital currency, but said he welcomed controls.
Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.
UltraISO is an ISO CD/DVD image file tool that creates, edits and converts. It is also a bootable CD/DVD maker that has the ability to ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest