|Filed Under:||Technology / Security|
|Posts on Regator:||1519|
|Posts / Week:||5.6|
|Archived Since:||February 3, 2010|
Apple's developer site has been down for two days. Some have experienced password reset emails, which appear to be sent by Apple, but were not authorized — suggesting foul play.
The secret order that authorized snooping on millions of Americans was set to expire. But was it not inevitable that the order would be renewed before it ran out, just as it was before?
U.K. police and government agencies' demands for data snooping rose by 16 percent to more than a half-million requests for citizen data in 2012 as a result of the Olympics in London.
The review was confirmed after a parliamentary report raised concerns that security testers working at the Oxfordshire cybersecurity center were paid by Huawei.
Google Glass faced its first security vulnerability in the form of a QR code that allowed a hacker to take over the wearable computer.
Signals intelligence agency GCHQ didn't break British laws when conducting its mass surveillance program in conjunction with the Americans, but MPs are instead looking at whether the laws should be updated.
Microsoft says it does not provide the NSA or any U.S. government agency with the ability to bypass its encryption or give 'direct access' to user data.
The privacy group, representing 19 diverse groups — including a gun rights groups and a Los Angeles church — claim the NSA's PRISM and fiber cable spying program violates their constitutional rights.
Prepare for a bumpy ride for July's roundup of Patch Tuesday updates, Microsoft warns, with critical flaws for almost every version of Windows running every bit of hardware.
In 2012, around 2.5 million Californians were victim of a corporate data breach. But more than half of those affected could've been protected had their data been encrypted.
Another leaked batch of top secret slides relating to the U.S. National Security Agency's PRISM data collection program sheds further light on how non-U.S. data is collected from various tech firms, and how under law U.S. data is filtered out — albeit not always.
Norton published findings that Facebook's Android app has sent millions of people's phone numbers to its servers upon launch, without users even logging into the app.
The networking giant has fixed a number of vulnerabilities that could allow hackers to remotely execute commands or disrupt critical processes.
A four-year hacking spree inflicted on South Korea is apparently down to a single hacking group called the "Dark Seoul Gang."
The computer and server maker is working hard on a fix to a security flaw in one of its enterprise systems, that could allow unauthorized access to corporate data.
According to the firm who found the bug, Facebook's email to six million users affected by its shadow profiles leak left out some numbers - and non-user contacts were also leaked.
What are the most common, and serious, database vulnerabilities that businesses should be aware of?
Have you see those "warning" pages Google throws up when you're about to hit a malware-infested site? The search giant is now adding those flagged figures to its ongoing disclosure report.
Before Microsoft acquired Skype in 2011, the voice calling service was already ditching its "near impossible to wiretap" peer-to-peer model in favor of the cloud.
A new "two-man rule" will be put into place to stop administrators from having access to entire governmental systems.