The view from the top of IT with TechWorld Editor Rohan Pearce
The secret Foreign Intelligence Surveillance Court has ruled against a U.S. government request that it be allowed to hold telephone metadata beyond the current five-year limit as it may be required as evidence in civil lawsuits that question the data collection.
By John Ribeiro | 10 March, 2014 05:31
Hackers attacked the personal blog of Mt. Gox CEO Mark Karpeles on Sunday and posted what they claim is a ledger showing a balance of some 950,000 bitcoins based on records they obtained from the defunct exchange for the virtual currency.
By Jeremy Kirk | 10 March, 2014 01:53
The iOSphere overflowed with gratitude for the monumental failure, the colossal collapse, the flop, the fiasco, the disaster of the iPhone 5C because it has finally convinced Apple to give the iPhone 6 a screen larger than four inches.
By John Cox | 07 March, 2014 21:11
U.S. retailers are digging in their heels over their need for PIN authentication for Europay MasterCard Visa (EMV) smartcard use here.
By Jaikumar Vijayan | 07 March, 2014 21:05
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices.
By Joab Jackson | 07 March, 2014 18:00
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards.
By Mikael Ricknäs | 07 March, 2014 16:16
Telstra received about 40,000 requests for customer information from Australian government agencies in the second half of 2013, not counting national security requests, the telco has revealed.
By Adam Bender | 07 March, 2014 15:37
Japanese authorities are trying to unravel what happened at Mt. Gox, the popular Bitcoin exchange that collapsed last week, and recent revelations are only serving to thicken the plot, not clarify it.
By Tim Hornyak and Jeremy Kirk | 07 March, 2014 15:08
The U.S. National Security Agency (NSA) has turned the European Union into a tapping "bazaar" in order to spy on as many EU citizens as possible, NSA leaker Edward Snowden said.
By Loek Essers | 07 March, 2014 13:07
Strategically leaking information about upcoming smartphones and tablets to the press is a favorite way for manufacturers to create buzz around their products without having to spoil everything in an official reveal. This has been your tech marketing tip of the day, thank you, you've been a lovely audience.
By Jon Gold | 06 March, 2014 23:01
Microsoft is issuing five security bulletins this month, two of them critical and affecting all versions of Internet Explorer as well as all versions of Windows from XP to 8/8.1.
By Tim Greene | 06 March, 2014 23:01
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
By Ellen Messmer | 06 March, 2014 21:13
An updated Apple whitepaper on iOS security delves into an unprecedented amount of detail about the security architecture and features of the company's mobile OS for devices such as the iPhone and iPad. Security professionals and IT consultants are praising both the company's transparency and its approach to protecting iOS devices, Internet security and users' data.
By John Cox | 06 March, 2014 21:13
Microsoft will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer that hackers have been exploiting since January.
By Gregg Keizer | 06 March, 2014 21:01
The U.S. Federal Trade Commission should investigate Facebook's proposed US$19 billion acquisition of mobile messaging app WhatsApp -- and possibly block it -- because of the potential impact on users' privacy, two privacy groups said in a complaint filed Thursday.
By Grant Gross | 06 March, 2014 20:09
With some opening shots in a cyber component to the war of nerves in the Ukraine already fired, security analysts today offered a look at how a full-fledged cyberwar in the region would unfold.
By Gregg Keizer | 06 March, 2014 20:06
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software, a provider of business intelligence software, and Splunk, which sells a log-file search engine.
By Joab Jackson | 06 March, 2014 17:50
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
By Lucian Constantin | 06 March, 2014 17:35
Secretive Bitcoin creator Satoshi Nakamoto is a 64-year-old man living near Los Angeles who declines to talk about his role in the digital currency, according to a news report.
By Grant Gross | 06 March, 2014 16:03
Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability.
By Lucian Constantin | 06 March, 2014 12:18